Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
552,979 coordinated disclosures
355,358 fixed vulnerabilities
833 bug bounties with 1,615 websites
17,209 researchers, 1151 honor badges

Vovsoft Bug Bounty Program

Vovsoft runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of Vovsoft

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between Vovsoft and researchers.

Bug bounty program allow private and public submissions.

Bug Bounty Scope

The following websites are within the scope of the program:

*.vovsoft.com

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

• You can exploit the vulnerability for demonstration purpose, but this should not lead to service outages (DoS) as well as the manipulation or loss of data. The purpose of the demonstration should show the attack vector and should not cause any damage.
• Do not share gathered information with third parties.
• Please make sure to provide enough information so that we can reproduce the issue.

Testing Requirements:

If possible, provide us with full test scenario how to reproduce the issue.

Possible Awards:

We will provide a license key of any Vovsoft product you choose. Also we will recommend you on your profile.

Other Submissions Handling

Website owner want to receive information about other vulnerabilities

Notifications:

https://vovsoft.com/contact/

General Requirements:

• You can exploit the vulnerability for demonstration purpose, but this should not lead to service outages (DoS) as well as the manipulation or loss of data. The purpose of the demonstration should show the attack vector and should not cause any damage.
• Do not share gathered information with third parties.
• Please make sure to provide enough information so that we can reproduce the issue.

Testing Requirements:

If possible, provide us with full test scenario how to reproduce the issue.

Possible Awards:

We will provide a license key of any Vovsoft product you choose. Also we will recommend you on your profile.

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  How quickly researchers get responses to their submissions.
Remediation Time  How quickly reported submissions are fixed.
Cooperation and Respect  How fairly and respectfully researchers are being treated.

Researcher's comments

No comments so far.

  Latest Patched

 05.08.2020 rta.ae
 05.08.2020 thisismoney.co.uk
 05.08.2020 bayt.com
 05.08.2020 satkurier.pl
 05.08.2020 mysurvey.com
 05.08.2020 mustit.co.kr
 04.08.2020 hardware.fr
 04.08.2020 gamemeca.com
 04.08.2020 affinity.com
 04.08.2020 eua.be

  Latest Blog Posts

24.06.2020 by Gkexamquiz
How to Find Contacts To Report Bugs & Security Vulnerabilities | Bug Bounty Tutorials 2020
24.06.2020 by 0xcrypto
Improper Access Control - Generic: Unrestricted access to any "connected pack" on docs in coda.io
04.04.2020 by Rando02355205
(Alibaba) message.alibaba.com [IDOR] - [Bug Bounty]
12.03.2020 by Rando02355205
(Paypal) www.paypal.com [CSP High Level] - [XSS Reflected] - [Bug Bounty] - [Write Up]
08.03.2020 by CybeReports
JDECO.net XSS Vulnerability| CybeReports

  Recent Recommendations

    5 August, 2020
     h_ono:
Great work, thanks for finding a bug and kindly reporting it.
    3 August, 2020
     RedLeoteca:
Thank you so much for your report.
    3 August, 2020
     Robert_CMI:
Thank you for reporting the vulnerability on our website, we very much appreciate your quick response and good description of the issue.
    1 August, 2020
     aboros:
Thank you for finding several issues on our site
    30 July, 2020
     HoutVasthouden:
Thank you Gaurav for helping us making our website a safer place! You reported a XSS vulnerability on one of our webforms, you gave us very clear information on the issue, so that we were able to fix the bug.
Keep up the good work!