Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
557,610 coordinated disclosures
356,997 fixed vulnerabilities
846 bug bounties with 1,635 websites
17,406 researchers, 1156 honor badges

Coordinated Disclosure Vulnerability

This vulnerability was reported via our coordinated disclosure Open Bug Bounty program and patched.

  Latest Patched

 14.08.2020 te31.com
 14.08.2020 apps.tn.gov
 13.08.2020 101domain.com
 13.08.2020 clickme.net
 13.08.2020 abebooks.co.uk
 13.08.2020 zvab.com
 13.08.2020 abebooks.com
 12.08.2020 prisguiden.no
 12.08.2020 daveramsey.com
 12.08.2020 2gis.kz

  Latest Blog Posts

24.06.2020 by Gkexamquiz
How to Find Contacts To Report Bugs & Security Vulnerabilities | Bug Bounty Tutorials 2020
24.06.2020 by 0xcrypto
Improper Access Control - Generic: Unrestricted access to any "connected pack" on docs in coda.io
04.04.2020 by Rando02355205
(Alibaba) message.alibaba.com [IDOR] - [Bug Bounty]
12.03.2020 by Rando02355205
(Paypal) www.paypal.com [CSP High Level] - [XSS Reflected] - [Bug Bounty] - [Write Up]
08.03.2020 by CybeReports
JDECO.net XSS Vulnerability| CybeReports

  Recent Recommendations

    13 August, 2020
     TristanGuiheux:
4N_CURZE has helped us to find and fix some issues on web sites we're protecting. This kind of help is greatly appreciated from a security perspective. This way we can improve ourselves and protect our customers.

More specifically, the completeness of the report and the details to correct the vulnerability were very appreciated. It was precise and clear. With such good writing skills proven by 4N_CURZE, it's easy to send it to developpers in a way they can understand both problematic and solution.

Thanks again in my name.
    13 August, 2020
     CPCuk:
Thank you for reporting the XSS vulnerability. We were able to resolve the issue thanks to the information you provided.
    12 August, 2020
     www_aasv_org:
Caught me having forgotten to entity-encode values when re-displaying an incomplete form submission. While the initial report was all I needed to patch, Rajash considerately provided additional detail without being asked through the openbugbounty comments.
    10 August, 2020
     msawired:
Thank you for reporting the XSS vulnerability. Your explanations were very helpful, and we were able to resolve the issue in no time.
    6 August, 2020
     Robert_CMI:
Thank you Rajesh for reporting vulnerabilities on our website, your quick and detailed response was very valuable to us!