Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
585,135 coordinated disclosures
376,364 fixed vulnerabilities
896 bug bounties with 1,797 websites
18,191 researchers, 1185 honor badges

SL Business Directory bug hunt Bug Bounty Program

SL Business Directory bug hunt runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of SL Business Directory bug hunt

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between SL Business Directory bug hunt and researchers.

Bug bounty program allow private and public submissions.

Bug Bounty Scope

The following websites are within the scope of the program:

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

Any kind of a security issue submission is welcome. The program includes the following projects: SL Business Directory, SmartBots, SpeedLight Web Viewer.

Testing Requirements:

No special requirements. Please do not involve testing which can cause DOS/DDOS

Possible Awards:

Each submission is valuated individually. We'll try to settle the meaningful reward.

Special Notes:

Reports can be sent to bugz 4T slbiz2life d_t com

Other Submissions Handling

Website owner want to receive information about other vulnerabilities


We accept all security reports, including intrusive: injections, access security leaks and such.

General Requirements:

We worry about any kind of security breach (except heavy DOS/DDOS attacks). Feel free to report any issue you face.

Testing Requirements:

Although we encourage any kind of research, please avoid: measures which lead to DOS/DDOS; data-destructive tests, including POC. If issue may lead to the data destruction please contact us first to do the harmless testing.

Possible Awards:

Each submission is valuated individually. We'll try to settle the meaningful reward which satisfy both sides.

Special Notes:

Reports can be sent to bugz 4T slbiz2life d_t com

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

Response Time  Information How quickly researchers get responses to their submissions.
Remediation Time  Information How quickly reported submissions are fixed.
Cooperation and Respect  Information How fairly and respectfully researchers are being treated.

Researcher's comments

No comments so far.

  Latest Patched


  Latest Blog Posts

14.09.2020 by aninda_anon
VPS Cheatsheet for bug hunting
14.09.2020 by pk_12397
A Story of IDOR To Account Takeover
14.09.2020 by febin_rev
How to find valid and impactful CSRFs
14.09.2020 by _r00t1ng_
Using {XSS} to play games on Site
24.06.2020 by Gkexamquiz
How to Find Contacts To Report Bugs & Security Vulnerabilities | Bug Bounty Tutorials 2020

  Recent Recommendations

@trippingflags     24 September, 2020
    Twitter trippingflags:
Thanks for highlighting this issue for us and also for re-testing it once we patched it. :)
@rus_cert     24 September, 2020
    Twitter rus_cert:
Thank you for your very detailed and helpful reports :-)
@TinNguy54963117     23 September, 2020
    Twitter TinNguy54963117:
Thank you for the accurate and quick response in disclosing our vulnerability. This was done in a professional and responsible manner through the bug bounty program, giving us time to remediate.
@flanorello     23 September, 2020
    Twitter flanorello:
any1 reported a XSS vulnerability in our application and provided us with all information necessary to reproduce and fix the issue.
Communication was timely and smooth. Thanks!
@judythai     22 September, 2020
    Twitter judythai:
Thank you, Pankaj, for sending such a detailed report to help us reproduce and fix a security issue. You were also very responsive to our follow-up. Appreciate your work!