Open Bug Bounty selected among the
Top 5 Bug Bounty programs to watch
by The Hacker News

All Open Bug Bounty emails are sent only from openbugbounty.org domain being digitally signed. All others are fake. Learn more.
For security researchers
Report a Vulnerability
Submit, help fixing, get kudos.
For website owners
Start a Bug Bounty
Run your bounty program for free.
1,246,748 coordinated disclosures
899,027 fixed vulnerabilities
1,584 bug bounty programs, 3,148 websites
28,430 researchers, 1,443 honor badges

Privacy and Security

We do not store, process or export any Personally Identifiable Information (PII) as defined in General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679).

To avoid storing any user-related data, we use external authentication via Twitter for everyone on the website. Connection to the website is available via HTTPS only.

Open Bug Bounty does not transfer any vulnerabilities, or vulnerability-related data, to any third-parties.

For privacy reasons, we also keep no logs of any activities of website owners or security researchers.

Terms and Conditions

Open Bug Bounty reserves the right to reject any Open Bug Bounty Program for any reason in its sole discretion.

Open Bug Bounty may terminate any Researcher's or Website Owner's access to and use of the Open Bug Bounty Platform, at Open Bug Bounty's sole discretion, at any time and without notice to the Researcher or Website Owner.

The site may contain links to third-party websites or resources. Open Bug Bounty provides these links only as a convenience and is not responsible for the content, products or services on or available from those websites or resources or links displayed on such websites. Researcher or Website Owner acknowledges sole responsibility for and assumes all risk arising from Researcher's or Website Owner's use of any third-party websites or resources.

By using Open Bug Bounty you agree to (i) carefully follow technical submissions guidelines, and to (ii) respect our ethics requirements available here and applicable both for security researchers and bug bounty owners. Material violations of these terms may lead to permanent suspension of your account on the website.

By using Open Bug Bounty you also unconditionally agree that (i) Open Bug Bounty shall never be held liable, accountable or responsible for any of your interactions with any other Open Bug Bounty project users, and that (ii) all the website features and functionalities are provided “as is” without any warranty of any kind. If you disagree with any of these terms, you are kindly required to leave this website.










  Latest Patched

 25.06.2022 mohca.gov.bt
 25.06.2022 ual.es
 25.06.2022 aslteramo.it
 25.06.2022 understood.org
 25.06.2022 ossokolje.edu.ba
 25.06.2022 e.csb.gov.lv
 25.06.2022 mansfield.vic.gov.au
 25.06.2022 educba.com
 25.06.2022 fodors.com

  Latest Blog Posts

15.02.2022 by sepkatpro
Ultimate XSS Polyglot
11.11.2021 by mistry4592
The Most used Chrome Extensions are Used For Penetration Testing.
08.10.2021 by NNeuchi
How I Found My First Bug Reflected Xss On PIA.GOV.PH(Philippine Information Agency)
26.08.2021 by PyaePhyoThu98
eG Manager v7.1.2: Improper Access Control lead to Remote Code Execution (CVE-2020-8591)
14.07.2021 by Open Bug Bounty
Interview With Open Bug Bounty

  Recent Recommendations

@TiagoGuedesEGo1     20 June, 2022
    Twitter TiagoGuedesEGo1:
shashank_bhure made us aware of several security vulnerabilities that represented security flaws of several degrees and needed to be rectified.

It was a pleasure working with you and I hope we can work again in the future, Thank you!
@TiagoGuedesEGo1     15 June, 2022
    Twitter TiagoGuedesEGo1:
Hardik_850 made us aware of several security vulnerabilities that represented security flaws of several degrees and needed to be rectified.

It was a pleasure working with you and I hope we can work again in the future, Thank you!
@DeBuecher     3 June, 2022
    Twitter DeBuecher:
Peter was of good help
@salmankhan2016     26 May, 2022
    Twitter salmankhan2016:
thanyou security_helper5
@securityhelper5     26 May, 2022
    Twitter securityhelper5:
thank you for report