Infosec Institute

Open Bug Bounty mentioned in the
Top 6 Bug Bounty programs of
2022 by the InfoSec Institute

The Hacker News

Open Bug Bounty named among the
Top 5 Bug Bounty programs of 2021
by The Hacker News

Platform update: please use our new authentication mechanism to securely use the Open Bug Bounty Platform.
For security researchers
Report a Vulnerability
Submit, help fixing, get kudos.
For website owners
Start a Bug Bounty
Run your bounty program for free.
1,722,136 coordinated disclosures
1,391,718 fixed vulnerabilities
2,014 bug bounty programs, 3,932 websites
48,641 researchers, 1,658 honor badges

Programmers Tools Bug Bounty Program

Programmers Tools runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of Programmers Tools

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between Programmers Tools and researchers.

Bug bounty program allow private and public submissions.

Bug Bounty Scope

The following websites are within the scope of the program:

programerstools.tech

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

Reporting a Vulnerability
If you have discovered a security vulnerability, please report it to us promptly.

Details: Include a detailed description of the vulnerability, including:
- PoC with the instructions to re-produce and CVSS score
- Instructions to fix the vulnerability
- Any relevant URLs
- Your contact information for follow-up questions

Testing Requirements:

- Do no harm: Do not exploit the vulnerability beyond what is necessary to demonstrate it.
- Any kind of test is welcome, but please don't break the site.
- Confidentiality: Do not disclose the vulnerability to others until it has been fixed.
- Please do not launch any DoS or DDoS attacks

Possible Awards:

- Recommendation in the researcher's profile
- I created this project as a hobby so I cannot offer monetary awards at this time.
- Credits to the researcher in website code.
- I can create a page on the website and display researchers name and contact details thanking the researcher for the contribution.

Other Submissions Handling

Website owner want to receive information about other vulnerabilities

Notifications:

[email protected]

General Requirements:

Reporting a Vulnerability
If you have discovered a security vulnerability, please report it to us promptly.

Details: Include a detailed description of the vulnerability, including:
- PoC with the instructions to re-produce and CVSS score
- Instructions to fix the vulnerability
- Any relevant URLs
- Your contact information for follow-up questions

Testing Requirements:

- Do no harm: Do not exploit the vulnerability beyond what is necessary to demonstrate it.
- Any kind of test is welcome, but please don't break the site.
- Confidentiality: Do not disclose the vulnerability to others until it has been fixed.

Possible Awards:

- Recommendation in the researcher's profile
- I created this project as a hobby so I cannot offer monetary awards at this time.
- Credits to the researcher in website code.
- I can create a page on the website and display researchers name and contact details thanking the researcher for the contribution.

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  Information How quickly researchers get responses to their submissions.
Remediation Time  Information How quickly reported submissions are fixed.
Cooperation and Respect  Information How fairly and respectfully researchers are being treated.

Researcher's comments

No comments so far.

  Latest Patched

 16.06.2024 portal.uoalhuda.edu.iq
 16.06.2024 evdekal.odu.edu.tr
 16.06.2024 dkdp.uobasrah.edu.iq
 16.06.2024 dprc.uobasrah.edu.iq
 16.06.2024 units.uoalhuda.edu.iq
 16.06.2024 users.uoalhuda.edu.iq
 16.06.2024 en.msc.uobasrah.edu.iq
 16.06.2024 deps.uoalhuda.edu.iq

  Latest Blog Posts

04.12.2023 by BAx99x
Unmasking the Power of Cross-Site Scripting (XSS): Types, Exploitation, Detection, and Tools
04.12.2023 by a13h1_
$1120: ATO Bug in Twitter’s
04.12.2023 by ClumsyLulz
How I found a Zero Day in W3 Schools
04.12.2023 by 24bkdoor
Hack the Web like a Pirate: Identifying Vulnerabilities with Style
04.12.2023 by 24bkdoor
Navigating the Bounty Seas with Open Bug Bounty

  Recent Recommendations

    4 June, 2024
    ThirdDoorMedia:
Researcher reported public Docker local env file, no security breach but this file should not be publicly available, thanks SYPltd.
    4 June, 2024
    ThirdDoorMedia:
Researcher reported public local env Docker file, no security breach but file should not be publicly available, thank you SYPltd.
    29 May, 2024
    jraymond:
It was the first time for us that we received a report about openbugbounty. The researcher reported a demo dockerfile on our website. No security breach but it's not "professionnal" to see this kind of file on a website.
Thank you SYPltd
    28 May, 2024
    MotionTM:
Thank you very much for your support and uncovering the vulnerabilities.
    28 May, 2024
    MotionTM:
Thank you very much for your support and uncovering the vulnerabilities.