Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
746,435 coordinated disclosures
438,103 fixed vulnerabilities
1148 bug bounties with 2,200 websites
20,670 researchers, 1257 honor badges

Privacy and Security

We do not store, process or export any Personally Identifiable Information (PII) as defined in General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679).

To avoid storing any user-related data, we use external authentication via Twitter for everyone on the website. Connection to the website is available via HTTPS only.

Open Bug Bounty does not transfer any vulnerabilities, or vulnerability-related data, to any third-parties.

For privacy reasons, we also keep no logs of any activities of website owners or security researchers.

Terms and Conditions

Open Bug Bounty reserves the right to reject any Open Bug Bounty Program for any reason in its sole discretion.

Open Bug Bounty may terminate any Researcher's or Website Owner's access to and use of the Open Bug Bounty Platform, at Open Bug Bounty's sole discretion, at any time and without notice to the Researcher or Website Owner.

The site may contain links to third-party websites or resources. Open Bug Bounty provides these links only as a convenience and is not responsible for the content, products or services on or available from those websites or resources or links displayed on such websites. Researcher or Website Owner acknowledges sole responsibility for and assumes all risk arising from Researcher's or Website Owner's use of any third-party websites or resources.

By using Open Bug Bounty you agree to (i) carefully follow technical submissions guidelines, and to (ii) respect our ethics requirements available here and applicable both for security researchers and bug bounty owners. Material violations of these terms may lead to permanent suspension of your account on the website.

By using Open Bug Bounty you also unconditionally agree that (i) Open Bug Bounty shall never be held liable, accountable or responsible for any of your interactions with any other Open Bug Bounty project users, and that (ii) all the website features and functionalities are provided “as is” without any warranty of any kind. If you disagree with any of these terms, you are kindly required to leave this website.










  Latest Patched

 22.01.2021 ecu.edu.au
 21.01.2021 liveauction.am
 21.01.2021 esto.nasa.gov
 21.01.2021 french-bookys.org
 21.01.2021 dmm.com
 21.01.2021 polimi.it
 20.01.2021 4gamer.net
 20.01.2021 splunk.com
 20.01.2021 tirebouchon.me
 20.01.2021 rand.org

  Latest Blog Posts

25.12.2020 by _Y000_
How to bypass mod_security (WAF)
10.12.2020 by _Y000_
sql injection to bypass Mod_Security
10.12.2020 by _Y000_
Create encoded sql payloads
26.10.2020 by _r00t1ng_
Bypass Addslashes using Multibyte Character
26.10.2020 by _r00t1ng_
One Payload to Inject them all - MultiQuery Injection

  Recent Recommendations

@hoshitabeman     21 January, 2021
    Twitter hoshitabeman:
It was very helpful for me to point out that I forgot to delete php.info!
@Azatotht     21 January, 2021
    Twitter Azatotht:
Thanks for pointing out a public phpinfo() on our website. A++
@vegasworld     21 January, 2021
    Twitter vegasworld:
Great Job from PRAMOD YADAV. Thanks to his advice we could fix a bug on our Website.
Thanks again!
Best wishes from Germany
@domenico     21 January, 2021
    Twitter domenico:
Thank you Pramod for pointing to the leftover .php file that shouldn't be there.
@seinemaritime     21 January, 2021
    Twitter seinemaritime:
Thank you Pramod for your report. Thank you also for the details in mail ! I recommend him !