Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
584,556 coordinated disclosures
375,718 fixed vulnerabilities
893 bug bounties with 1,783 websites
18,175 researchers, 1183 honor badges

intrusivethoughts.org Bug Bounty Program

intrusivethoughts.org runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of intrusivethoughts.org

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between intrusivethoughts.org and researchers.

Bug bounty program allow private and public submissions.

Bug Bounty Scope

The following websites are within the scope of the program:

intrusivethoughts.org

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

No general requirements

Testing Requirements:

No testing requirements

Possible Awards:

No possible awards

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  Information How quickly researchers get responses to their submissions.
Remediation Time  Information How quickly reported submissions are fixed.
Cooperation and Respect  Information How fairly and respectfully researchers are being treated.

Researcher's comments

No comments so far.

  Latest Patched

 24.09.2020 bricodepot.fr
 24.09.2020 silhouetteamerica.com
 23.09.2020 heute.at
 23.09.2020 fssai.gov.in
 23.09.2020 wired.com
 23.09.2020 instadp.com
 23.09.2020 hoc24.vn
 23.09.2020 korg.com
 22.09.2020 yeggi.com

  Latest Blog Posts

14.09.2020 by aninda_anon
VPS Cheatsheet for bug hunting
14.09.2020 by pk_12397
A Story of IDOR To Account Takeover
14.09.2020 by febin_rev
How to find valid and impactful CSRFs
14.09.2020 by _r00t1ng_
Using {XSS} to play games on Site
24.06.2020 by Gkexamquiz
How to Find Contacts To Report Bugs & Security Vulnerabilities | Bug Bounty Tutorials 2020

  Recent Recommendations

@TinNguy54963117     23 September, 2020
    Twitter TinNguy54963117:
Thank you for the accurate and quick response in disclosing our vulnerability. This was done in a professional and responsible manner through the bug bounty program, giving us time to remediate.
@judythai     22 September, 2020
    Twitter judythai:
Thank you, Pankaj, for sending such a detailed report to help us reproduce and fix a security issue. You were also very responsive to our follow-up. Appreciate your work!
@Fla_ke     22 September, 2020
    Twitter Fla_ke:
HowardPotts provided us some useful information about a potential security problem on our main website. He quickly answered all our questions. Thks!
@MalagaCarCom     22 September, 2020
    Twitter MalagaCarCom:
Thank you very much, now our website is more secure.
@kitnospt     22 September, 2020
    Twitter kitnospt:
Thanks for all the help and detailed reporting