Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
533,494 coordinated disclosures
333,515 fixed vulnerabilities
784 bug bounties with 1,552 websites
15,924 researchers, 1099 honor badges

Tuonetti Bug Bounty Program

Tuonetti runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of Tuonetti

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between Tuonetti and researchers.

Bug bounty program allow private submissions only.

Bug Bounty Scope

The following websites are within the scope of the program:

No verified websites yet

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

Detailed information of vulnerabilities with possible impact.
Contact us before running any scanners on the websites.

Testing Requirements:

Intrusive and aggressive scanning is not allowed.

Possible Awards:

Always an endorsement and a positive recommendation.
Other bounties based on the severity of the issue.

Special Notes:

Causing business disturbance on our website with any aggressive scanning will deny any possible rewards. Please contact us first if you want to do scanning.

Other Submissions Handling

Website owner want to receive information about other vulnerabilities

Notifications:

Email: [email protected]

General Requirements:

Detailed information of vulnerabilities. You are required to contact us before you are allowed to do any intrusive testing.

Testing Requirements:

Intrusive and aggressive scanning is not allowed.

Possible Awards:

Will be evaluated per reported vulnerability.

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  How quickly researchers get responses to their submissions.
Remediation Time  How quickly reported submissions are fixed.
Cooperation and Respect  How fairly and respectfully researchers are being treated.

Researcher's comments

No comments so far.

  Latest Patched

 28.05.2020 aff.to
 27.05.2020 gamebanana.com
 26.05.2020 arise.com
 26.05.2020 plantronics.com
 26.05.2020 benditofutbol.com
 25.05.2020 alaneesqatar.qa
 25.05.2020 shorturl.at
 25.05.2020 torrentoon.com
 25.05.2020 www1.eeoc.gov
 25.05.2020 fcrs.treas.gov

  Latest Blog Posts

04.04.2020 by Rando02355205
(Alibaba) message.alibaba.com [IDOR] - [Bug Bounty]
12.03.2020 by Rando02355205
(Paypal) www.paypal.com [CSP High Level] - [XSS Reflected] - [Bug Bounty] - [Write Up]
08.03.2020 by CybeReports
JDECO.net XSS Vulnerability| CybeReports
29.02.2020 by Rando02355205
(Google) groups.google.com - [Stored XSS] - [Bug Bounty] - [WriteUp] - [24/02/2020]
10.02.2020 by 0xrocky
Stored XSS on h2biz.net

  Recent Recommendations

    26 May, 2020
     viewbug:
Thank you Guarav! Very professional on checking our site for bugs and for providing the details in such a professional manner. We appreciate your help making our platform more secure
    26 May, 2020
     redicius:
Tested my site a lot (according to log :) and found an hidden XSS issue in our site.
Thank you!
    26 May, 2020
     chrisjimallen:
Very helpful insights, spotted something I'd overlooked.
    25 May, 2020
     thisismeraul:
Thanks for finding this vulnerability for us. The corporate website is more secure now. Good job!
    25 May, 2020
     VICTOR__Europe:
Thank you for helping us to fix the critical SQL injection.
Friendly contact, thanks for the effort.