follow us on twitter . like us on facebook . follow us on instagram . subscribe to our youtube channel . announcements on telegram channel



Recent Posts

Pages: 1 ... 6 7 [8] 9 10
71
Bug bounty programs / LGE Bug Bounty
« Last post by Angelina on July 20, 2023, 06:38:51 pm »
submit bug report: http://www.lg.com

If you have found a potential security issue with any of our products or services related to our products, we kindly ask you to let us know at your earliest convenience via email at product.security@lge.com
72
Bug bounty programs / Kyup Bug Bounty
« Last post by Angelina on July 20, 2023, 06:37:42 pm »
submit bug report: http://kyup.com

If you believe you've discovered a security vulnerability in Kyup, you may responsibly disclose your find by sending an email to security@kyup.com. Please include the following details with your disclosure:
Description of vulnerability and potential impact.
Detailed description of steps taken to reproduce the bug or proof of concept.
Name and/or link for (optional) attribution on this page.
We will review the bug and reply with details on eligibility for bounty and how to receive it.
Policy: https://kyup.com/bounty
73
Bug bounty programs / ING Bug Bounty
« Last post by Angelina on July 20, 2023, 06:36:22 pm »
submit bug report: http://ing.com

What to report?
Vulnerabilities with regard to the safety of ING’s services offered through the internet. In case you have discovered a vulnerability in our system, please report this as quickly as possible. Examples of vulnerabilities could be:
Cross scripting (XSS) vulnerabilities
SQL injection vulnerabilities
Encryption vulnerabilities
Vulnerabilities found at previous ING businesses cannot be reported by ING
What is responsible-disclosure@ing.com not used for?
Reporting complaints about ING’s services or products
Questions and complaints about the availability of ING websites, mobile banking or internet banking
Reporting monetary issues (e.g. ATM’s and pin devices)
Reporting Fraud or the presumption of Fraud
Reporting fake e-mails or phishing e-mails
Reporting malware
How can a vulnerability be reported?
A vulnerability can be reported by e-mail; responsible-disclosure@ing.com. A prerequisite for sending an e-mail to the above mentioned e-mail address is that you utilize the public PGP key (zip). Please ensure that your e-mail is written in a clear and succinctly way. Particularly include the following in your e-mail:
The steps you undertook
The entire URL
Objects (as filters or entry fields) possibly involved
Screen prints are welcome
Our specialists will read your report and start working on it right away. Did you find a vulnerability in one of our IT-systems. Please contact us directly and do not postpone.
Am I eligible for a reward after my finding?
ING highly appreciates your effort by assisting us in optimizing our systems and processes. In case your reported vulnerabilities have been solved or led to a change in our services, you will be eligible for a reward.
Can I report a vulnerability anonymously?
Sure, you do not have to provide your name and contact details in case you want to report a vulnerability. However, you should take into account that we are unable to discuss the next steps with you. For instance, we cannot inform you about what we will do with your discovered vulnerability, neither we can collaborate further, nor we can provide you with the appropriate credits or reward in return for your finding.
Your privacy
Your personal information is only used to approach you and undertake actions with regard to your reported vulnerability. We will not distribute your personal information to third parties without your permission. Unless, the law requires us to provide your personal information or when an external organization takes over the investigation of your reported vulnerability. In this case we will ensure that the applicable authority will treat your personal information confidentially. We will remain responsible for your personal information.
What will we do with your finding?
A team of security experts will investigate your finding. Within two working days you will be receiving an e-mail with a first reply. Note: revealing your finding to the public is not allowed, instead talk to our experts and give them time to assess and solve the problem. Accordingly, we will provide you with feedback with regard to your finding. We will explain to you whether we will solve the problem, how we will solve it and when.
Rules
By investigating our IT systems, it might be that you act prosecutable. In case you act with good faith, act in accordance to the mentioned rules of the ING, there will not be any inducement to report your action. Therefore, follow the rules of the responsible disclosure.
Ensure that during your and our investigation of your reported vulnerably, you do not apply any damage.
Do not utilize social engineering in order to gain access to our IT-systems.
Never can your investigation disrupt our (online) services.
Never can your investigation lead to the publicity of bank or customer data.
Do not put a backdoor in the system. Neither with the purpose to show the vulnerability. Putting a backdoor will bring damage to the safety of the system even more.
Do not apply any changes or delete data in the system. In case your finding requires a copy of the data from the system, do not copy more than your investigation requires. If one record is sufficient, do not copy more.
Do not make any changes in the system.
Do not attempt to penetrate the system more than required. In case you successfully penetrated the system, do not share gained access with others.
Do not utilize any brute force-technics (e.g. repeatedly entering passwords) in order to gain access to the system.
Don’t use techniques that can influence the availability of our (online) services.
Remaining conditions
We can only process reported vulnerabilities that are reported in Dutch or English.
In case you are eligible for a reward, we require your personal information.
In case your reported vulnerability is reported by others as well, the reward will be granted to the first reporter.
Responsible Disclosure regulation
With regard to reporting vulnerabilities in IT-systems, the National Cyber Security Centre of the Ministry of Security and Justice in the Netherlands has made up guidelines. ING’s guidelines are based upon those. In case you want to learn more about the guidelines made up by the Ministry of Security and Justice, visit: https://www.ncsc.nl/
Aberrant international regulation
We advise you to take into account that regulations with regard to the Responsible Disclosure differ per country. In case you are living abroad and have found vulnerabilities in one of our ING-pages, please realize that the Responsible Disclosure policy is not applicable in every country. This implies that despite you acted in accordance to ING’s Responsible Disclosure policy, it might still be that you will be prosecuted by justice, despite we do not report the vulnerability to justice.
More info
The US Federal Trade Commission provides information here on how to avoid phishing scams
The Anti-Phishing Working Group provides statistics on phishing attacks and advice for individuals and companies.
Policy: http://www.ing.com/ING.com-Security.htm
74
Bug bounty programs / Independer Bug Bounty
« Last post by Angelina on July 20, 2023, 06:35:17 pm »
submit bug report: http://www.independer.nl

Responsible Disclosure Policy Independer
Independer's mission is to restore confidence in financial institutions and products. In it we run themselves like lead. Independer customers can be confident that we are security and privacy seriously. Our systems are protected and continuously monitored for potential weaknesses. Yet it may happen that there is a problem with the security of one of our systems.
If you have found a flaw in one of our systems, we know. Then we can take steps as soon as possible. We like to work with you to better protect our clients and systems. So we have our security better for each other.
What we ask from you:
Mail your findings to beveiliging@independer.nl. Encrypt your findings with our [PGP key] (http://www.independer.nl/algemeen/info/responsible-disclosure/pgp-key.aspx) to prevent the information falling into the wrong hands.
Abuse not the issue. For example, by download more data than is necessary in order to demonstrate the problem or to view third-party data, to modify, or delete or modify systems.
Share it with others until the problem is resolved.
Erase the confidential information you obtained through the leak after closing the leak.
Do not use attacks on our physical security, social engineering, denial of service attacks, spam or third party applications.
Give us enough information to reproduce the problem so we can fix it as soon as possible. Usually the IP address or URL of the affected system and a description of the vulnerability sufficient, but more complex vulnerabilities can more information be needed..
What we promise you:
If you stick to the above conditions, we will take legal action against you as a result of the report.
We will respond within 3 working days your message with our assessment of the report and an expected date for a solution.
We treat your report confidentially and will not share your personal information with third parties without your permission unless it needs to fulfill a legal obligation. You can also report anonymously or under a pseudonym: we find it more important that you report it if you have found a vulnerability than that you announced.
We will keep you informed of the progress
In any reporting on the reported problem, we can include your name (or pseudonym) as the discoverer. Please mention it in your report to.
In return for your help, we offer a reward for any mention of a us unknown vulnerability. The size of the reward we determine according to the severity of the leak and the quality of the report with a minimum of a € 50, -.
Policy: http://www.independer.nl/algemeen/info/responsible-disclosure.aspx
75
Bug bounty programs / ICANN Bug Bounty
« Last post by Angelina on July 20, 2023, 06:34:09 pm »
submit bug report: http://www.icann.org

ICANN looks forward to working with the community to find security vulnerabilities in order to keep our businesses and customers safe.
SLA
ICANN will make a best effort to meet the following SLAs for hackers participating in our program:
Time to first response (from report submit) - 5 business days
Time to triage (from report submit) - 10 business days We’ll try to keep you informed about our progress throughout the process.
Disclosure Policy
As this is a private program, please do not discuss this program or any vulnerabilities (even resolved ones) outside of the program without express consent from the organization
Follow HackerOne's disclosure guidelines
Program Rules
Please provide detailed reports with reproducible steps
Submit one vulnerability per report, unless you need to chain vulnerabilities to provide impact
Social engineering (e.g. phishing, vishing, smishing) is prohibited
Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service
Only interact with accounts you own or with explicit permission of the account holder.
Prohibited Actions
Uploading files that allow arbitrary commands ( e.g., a webshell)
Modifying any files or data, including permissions
Creating and maintaining a persistent connection to the server
Intentionally viewing any files or data beyond what is needed to prove the vulnerability
Failing to disclose any actions taken or applicable required information
Out of Scope Assets
ICANN has numerous assets which are out of scope due to the hosting provider
Verify the asset is in scope by checking the DNS records, as ICANN may have a redirect to an out of scope IP
Out of Scope Vulnerabilities
When reporting vulnerabilities, please consider (1) attack scenario / exploitability, and (2) security impact of the bug. The following issues are considered out of scope:
Clickjacking on pages with no sensitive actions
Unauthenticated/logout/login CSRF
Attacks requiring MITM or physical access to a user's device
Previously known vulnerable libraries without a working Proof of Concept
Comma Separated Values (CSV) injection without demonstrating a vulnerability
Missing best practices in SSL/TLS configuration
Missing best practices in SPF/DMARC/DKIM configuration
Content spoofing and text injection issues without showing an attack vector/without being able to modify HTML/CSS
Any activity that could lead to the disruption/denial of our service (DoS)
Except those that can be described as "CWE-20: Improper Input Validation" type
Availability and Denial of Service Bugs
The Availability environment score modifier has been set to “Low” for all in scope systems. Impact to Availability will not elevate a bug to a Critical level, only the scores for Confidentiality and/or Integrity can elevate a bug to the Critical rating.
If a bug were to achieve a Critical rating due to the Availability score being Low or High, the impact will be noted but it will not raise the total score to a Critical rating.
Valid bug submissions which center around Availability and fall under CWE-20 may have their severity manually adjusted to reflect compensating controls or processes that are not visible to the submitter.
This represents the organizations compensating controls and risk tolerance for Availability of services.
Safe Harbor
Any activities conducted in a manner consistent with this policy will be considered authorized conduct and we will not initiate legal action against you. If legal action is initiated by a third party against you in connection with activities conducted under this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.
Failure to meet the above conditions and requirements may be considered a breach of responsible disclosure guidelines and eliminate any potential recognition of the submitted research contribution.
Thank you for helping keep ICANN and our users safe!
76
Bug bounty programs / Hyperledger Bug Bounty
« Last post by Angelina on July 20, 2023, 06:32:46 pm »
submit bug report:https://www.hyperledger.org/

Rewards
Our rewards are based on the impact of a vulnerability. Please note these are general guidelines and examples, and that reward decisions are up to the discretion of the Hyperledger security team.
Critical severity bugs - minimum [$2000]
Types of impacts that Hyperledger would consider to be critical include:
Fabric Certificate Authority bypasses--all endorsers and authentication of who can and cannot create transactions that go into the blockchain rely on the Fabric CA.
Preventing consensus--figuring out a way to stop the distributed system from achieving consensus. * Fabric uses a pluggable architecture for distributed consensus. Issues that can prevent consensus would be considered critical.
Escaping from a chaincode container--breaking out of the VM.
Unauthorized modifications of chaincode--changing the code that is executed inside of the VM. Types of vulnerabilities that may result in these impacts include:
Vertical authentication bypass.
Recording unauthorized, invalid, or forged transactions in the blockchain.
Amplification attack where chaincode generates malicious network traffic.
Denial of service of the whole blockchain by stopping chaincode execution and/or the consensus network.
Establishing a persistent beachhead inside of the firewall protecting the Fabric network.
High severity bugs - minimum [$1500]
Types of impacts that Hyperledger would consider to be high include:
Confused deputy attack on the Fabric Certificate Authority--mistakenly issued credentials to access the permissioned network or being re-issued another user’s credentials or otherwise affecting the permissions of other users.
Taking down any Fabric component (e.g. endorser, ordering service, membership service, consensus network) through malformed data submitted from the outside via the API. Types of vulnerabilities that may result in these impacts include:
Lateral authentication bypass.
Remote denial of service.
Default configuration errors.
Medium severity bugs - minimum [$500]:
Types of impacts that Hyperledger would consider to be medium include:
Taking down any Fabric component (e.g. endorser, ordering service, membership service, consensus network) through malformed data and/or fuzzing of its API used for inter-service communication behind the firewall. If you fuzz from a privileged network position (e.g. behind the firewall), then the vulnerability is of medium severity unless you can show that it can also be triggered from an unprivileged network position. Types of vulnerabilities that may result in these impacts include:
General instability.
Low severity bugs - minimum [$200]:
Types of impacts that Hyperledger would consider to be low include:
Vulnerabilities found in demo/example configuration, chaincode, and applications. Types of vulnerabilities that may result in these impacts include:
Footgun attack.
Last updated on July 19, 2018.
View changes
Policy

NOTE: None of the web sites run by The Linux Foundation or by the Hyperledger Foundation are eligible for the bounty. That means only the code in the Hyperledger Fabric codebase is eligible for the bounty. Everything else, including our websites, are not in scope (e.g. JIRA, homepage, and wiki).
UPDATE: We now have a free online course that covers all of the details of setting up a Hyperledger Fabric test network for analysis.
Hyperledger is a global open source collaborative effort created to advance cross-industry blockchain technologies, hosted by The Linux Foundation, and developed by technologists in finance, banking, internet of things, supply chains, manufacturing and technology.
Because blockchain and distributed ledger technology has such a wide range of applications, ranging from critical infrastructure (e.g. energy markets, bank settlements, etc) to social systems (e.g. digital healthcare records, voting, etc) the Hyperledger community is eager to work with the broader security community to help identify any security vulnerabilities in the various Hyperledger technologies and report and fix them in a timely and responsible manner.
Because Hyperledger projects are in various stages of development and maturity, the community has chosen to limit our bug bounty program to those projects that have reached a “1.0” release maturity. Additional projects will be joining the bug bounty in the near future, and we invite you to also review those when they join the bounty program.
The Hyperledger Foundation security team consists of volunteer open source developers that will make a best effort to respond to incoming reports within 2 business days and make a bounty determination after validating a legitimate security issue within 60 business days. Our transparency is greater than other organizations, however we are using a confidential vulnerability reporting and resolution system. We will do our best to keep you informed about our progress throughout the process and per our security policy, all vulnerabilities will be disclosed responsibly.
To better stay connected with the Hyperledger developers, it is recommended that you create a Linux Foundation ID. With the Linux Foundation ID you can access our Wiki and JIRA. We also have active mailing lists that you can join by going to https://lists.hyperledger.org/. You will also be able to access our JIRA bug tracking system at https://jira.hyperledger.org. We use Discord for chat
Thank you for your consideration. We hope that you will come join us in making solid blockchain technologies and platforms for the benefit of many different industries/applications.
Dos
Follow HackerOne’s disclosure guidelines.
Provide detailed reports with reproducible steps. If there is insufficient detail and we cannot reproduce the issue, the issue will not be eligible for a reward.
Submit one vulnerability per report, unless you can chain the vulnerabilities.
Treat everybody with respect, professionalism, fairness, and sensitivity to our many differences and strengths, including in situations of high pressure and urgency.
Be familiar with and follow our community code of conduct. Come hang out with us--or just lurk--in our chat and mailing lists. We’d love to meet you and have you join our community.
Don’ts
Social engineering of any kind (e.g. phishing, vishing, smishing). That is strictly prohibited and outside of the scope of this bounty program.
Program Rules
When duplicate reports occur, we will only award the first report received--provided that the report is well formed, can be fully reproduced, and meets all other submission criteria.
Multiple vulnerabilities caused by one underlying issue will be awarded one bounty.
Amounts below are the minimum we will pay per category. We aim to be fair; all reward amounts are at our discretion.
Rewards
Our rewards are based on the impact of a vulnerability. Please note these are general guidelines and examples, and that reward decisions are up to the discretion of the Hyperledger Foundation security team.
Critical severity bugs - minimum $2000
Types of impacts that Hyperledger would consider to be critical include:
Fabric Certificate Authority bypasses--all endorsers and authentication of who can and cannot create transactions that go into the blockchain rely on the Fabric CA.
Preventing consensus--figuring out a way to stop the distributed system from achieving consensus. * Fabric uses a pluggable architecture for distributed consensus. Issues that can prevent consensus would be considered critical.
Escaping from a chaincode container--breaking out of the VM.
Unauthorized modifications of chaincode--changing the code that is executed inside of the VM. Types of vulnerabilities that may result in these impacts include:
Vertical authentication bypass.
Recording unauthorized, invalid, or forged transactions in the blockchain.
Amplification attack where chaincode generates malicious network traffic.
Denial of service of the whole blockchain by stopping chaincode execution and/or the consensus network.
Establishing a persistent beachhead inside of the firewall protecting the Fabric network.
High severity bugs - minimum $1500
Types of impacts that Hyperledger would consider to be high include:
Confused deputy attack on the Fabric Certificate Authority--mistakenly issued credentials to access the permissioned network or being re-issued another user’s credentials or otherwise affecting the permissions of other users.
Taking down any Fabric component (e.g. endorser, ordering service, membership service, consensus network) through malformed data submitted from the outside via the API. Types of vulnerabilities that may result in these impacts include:
Lateral authentication bypass.
Remote denial of service.
Default configuration errors.
Medium severity bugs - minimum $500:
Types of impacts that Hyperledger would consider to be medium include:
Taking down any Fabric component (e.g. endorser, ordering service, membership service, consensus network) through malformed data and/or fuzzing of its API used for inter-service communication behind the firewall. If you fuzz from a privileged network position (e.g. behind the firewall), then the vulnerability is of medium severity unless you can show that it can also be triggered from an unprivileged network position.
Types of vulnerabilities that may result in these impacts include:
General instability.
Low severity bugs - minimum [$200]:
Types of impacts that Hyperledger would consider to be low include:
Vulnerabilities found in demo/example configuration, chaincode, and applications. Types of vulnerabilities that may result in these impacts include:
Footgun attack.
Scope
Only those projects listed, and the identified repositories are in scope.
Issues that may impact users with runtime components in production environments.
If you have any questions, please ask us at security@hyperledger.org BEFORE performing any testing.
Out of Scope
All of the Linux Foundation infrastructure in general and all of the Hyperledger Foundation infrastructure, specifically.
Any Hyperledger projects that have not reached 1.0 status. Only issues found against Hyperledger Fabric 1.0+ will be eligible for bounties.
All test and documentation code.
Issues in non-Hyperledger dependent projects. Issues in dependent projects should be reported directly to the respective project. Hyperledger projects regularly update dependency versions to fix issues identified in dependent projects.
If you identify any scopes not listed above that you believe belong to Hyperledger, please let us know at security@hyperledger.org BEFORE performing any testing.
Out of scope vulnerabilities
When reporting vulnerabilities, please consider (1) attack scenario / exploitability, and (2) security impact of the bug. The following issues are considered out of scope:
Intentionally malicious chaincode. Chaincode is Go running in a docker container. The security anchors in the controlled chaincode provisioning system that is designed to carefully manage what chaincode is installed and available to run.
Denial of service of any component (e.g. Endorser, etc) from a privileged network position (i.e. inside the firewall). Fabric is designed to run all components behind a corporate firewall. Clients outside the firewall will talk to a network service that uses the API to talk to the rest of the system behind the firewall.
Insecure configurations. We do our best to prevent the possibility of insecure configuration but we don’t see this as being in scope. If you find something, it would be great if you just filed a bug in our JIRA.
Documentation errors. We strive to keep the documentation up to date, but sometimes it becomes stale. We do not consider this to be in scope however we encourage you to file a JIRA bug or a pull request to fix it.
Thank you for helping keep Hyperledger and our users safe!
Getting Started
To help you get started with Hyperledger Fabric we have a few pieces of documentation:
The official Hyperledger Fabric documentation
We have also developed an introductory online course for Hyperledger Fabric, Sawtooth, and Iroha. It contains instructions for setting up a network and building an application on Hyperledger Fabric.
We also have a Hyperledger calendar of events where we will list community hackathons/hackfests where you can meet more Hyperledger developers and get more involved in our community.
77
Bug bounty programs / Hybridsaas Bug Bounty
« Last post by Angelina on July 20, 2023, 06:31:35 pm »
submit bug report: http://hybridsaas.com

Responsible disclosure
Hybrid SaaS vindt het erg belangrijk dat de eigen ICT-systemen veilig zijn en streeft het een hoge beveiliging daarvan na. Toch kan het gebeuren dat er een zwakke plek in één van deze systemen voorkomt.
Kwetsbaarheden in ICT-systemen van Hybrid SaaS
Indien u een zwakke plek in één van de ICT-systemen van Hybrid SaaS heeft gevonden, vernemen wij dit graag van u zodat zo snel mogelijk de benodigde maatregelen kunnen worden getroffen. Hybrid SaaS wil graag met u samenwerken om de veiligheid van de eigen ICT-systemen nog beter te kunnen beschermen. Met het oog hierop voert Hybrid SaaS onderstaand beleid inzake de omgang met meldingen van door u geconstateerde kwetsbaarheden in de ICT-systemen van Hybrid SaaS. Hieraan mag u Hybrid SaaS houden wanneer u een zwakke plek aantreft in een van de systemen.
Wij vragen u:
Uw bevindingen te mailen naar support@hybridsaas.com.
Voldoende informatie te geven om het probleem te reproduceren zodat Hybrid SaaS het zo snel mogelijk kunnen oplossen. Meestal is het IP-adres of de URL van het getroffen systeem en een omschrijving van de kwetsbaarheid voldoende, maar bij complexere kwetsbaarheden kan meer nodig zijn.
Contactgegevens achter te laten zodat Hybrid SaaS met u in contact kan treden om samen te werken aan een veilig resultaat. Laat minimaal een email adres of telefoonnummer achter.
De melding zo snel mogelijk na ontdekking van de kwetsbaarheid te doen.
De informatie over het beveiligingsprobleem niet met anderen te delen totdat het is opgelost.
Verantwoordelijk om te gaan met de kennis over het beveiligingsprobleem door geen handelingen te verrichten die verder gaan dan noodzakelijk is om het beveiligingsprobleem aan te tonen.
Vermijd dus in elk geval de volgende handelingen:
het plaatsen van malware.
het kopiëren, wijzigen of verwijderen van gegevens in een systeem (een alternatief hiervoor is het maken van een directory listing van een systeem).
het aanbrengen van veranderingen in het systeem.
het herhaaldelijk toegang tot het systeem verkrijgen of de toegang delen met anderen.
het gebruik maken van het zogeheten "bruteforcen" van toegang tot systemen.
het gebruik maken denial-of-service of social engineering.
Wat u mag verwachten:
Indien u bij de melding van een door u geconstateerde kwetsbaarheid in een ict-systeem van Hybrid SaaS aan bovenstaande voorwaarden voldoet, zal Hybrid SaaS geen juridische consequenties verbinden aan deze melding.
Hybrid SaaS behandelt een melding vertrouwelijk en deelt persoonlijke gegevens, niet zonder toestemming van de melder met derden, tenzij dit wettelijk of uit hoofde van een rechterlijke uitspraak verplicht is.
In onderling overleg kan Hybrid SaaS, indien u dit wenst, uw naam vermelden als de ontdekker van de gemelde kwetsbaarheid.
Hybrid SaaS stuurt u binnen 1 werkdag een ontvangstbevestiging.
Hybrid SaaS reageert binnen 3 werkdagen op een melding met de beoordeling van de melding en een verwachte datum voor een oplossing.
Hybrid SaaS houdt de melder op de hoogte van de voortgang van het oplossen van het probleem.
Hybrid SaaS lost het door u geconstateerde beveilingsprobleem in een systeem zo snel mogelijk, maar uiterlijk binnen 60 dagen, op. In onderling overleg kan worden bepaald of en op welke wijze over het probleem, nadat het is opgelost, wordt gepubliceerd.
Hybrid SaaS biedt een beloning als dank voor de hulp. Afhankelijk van de ernst van het beveiligingsprobleem en de kwaliteit van de melding, kan die beloning variëren van een cadeaubon, een gadget, tot het aanbieden van een baan. Het moet hierbij wel gaan om een voor Hybrid SaaS nog onbekend en serieus beveiligingsprobleem.
Kwetsbaarheden in ICT-systemen van derden:
Wij horen het ook graag als u een zwakke plek heeft gevonden in een systeem van één van onze klanten. Voor systemen van andere eigenaren/beheerders en of leveranciers dient u in eerste instantie de organisatie zelf te benaderen. Indien de organisatie niet, of niet goed reageert kunt u Hybrid SaaS op de hoogte brengen. Hierbij zullen wij een rol als intermediair op ons nemen om gezamenlijk tot een resultaat te komen.
Voor meldingen over systemen van derden:
Benadert u eerst de eigenaar, bij voorkeur op de wijze zoals vastgelegd in het door de organisatie opgestelde responsible disclosure beleid. Indien de organisatie niet, of niet goed reageert op uw melding kunt u een melding bij Hybrid SaaS doen zodat wij kunnen optreden als intermediair.
Reageert Hybrid SaaS binnen 3 werkdagen op een melding door contact op te nemen met de eigenaar en u een reactie te geven.
Is de eigenaar primair verantwoordelijk om de melder op de hoogte te houden van de voortgang van het oplossen van het probleem.
Zullen wij de eigenaar helpen met advies zodat het beveiligingsprobleem zo snel mogelijk verholpen kan worden.
Vragen wij u om ons informatie door te geven of en hoe er al contact is geweest met de organisatie.
Policy: http://www.hybridsaas.com/support/responsible-disclosure
78
Bug bounty programs / Hootsuite Bug Bounty
« Last post by Angelina on July 20, 2023, 06:30:25 pm »
submit bug report: https://hootsuite.com

We take security very seriously at Hootsuite, and have an Information Security Bug Bounty program geared towards the identification and remediation of security issues.
Submitting a Report
If you are interested in submitting your findings for review, please email hootsec@hootsuite.com. Please note that, upon your submission, it might take up to 5 business days to triage and identify the right severity for the issue. If Hootsuite is already aware of the issue, we do not offer any reward for the finding. We request you not to share or publish an unresolved vulnerability with any third parties.
Please make sure the findings you are submitting are reproducible and not self-exploitation issues. Make sure to include the following content in the submission:
Title of the finding
Description of the finding
Location of the finding (product module/page)
Steps to reproduce (include Request/Response logs if applicable)
Screenshots/Video recording (if applicable)
Severity
Please refer to the policy page to find out more about bug eligibility.
Contact Hootsuite Help for Other Inquiries
For incidents that affect a single account, please contact support request, they are your fastest response for single-user security issues.
Policy: https://hootsuite.com/security
79
Bug bounty programs / Hiro Bug Bounty
« Last post by Angelina on July 20, 2023, 06:29:30 pm »
submit bug report: https://hiro.so

Out of scope
The following items are considered out of scope for the Hiro bug bounty program:
Stacks Blockchain: For issues related to the Stacks blockchain, please report them through the Stacks Blockchain Bounty Program.
Ordinals Protocol: The Hiro bug bounty program does not cover reports related to the Ordinals protocol.
Bitcoin: Reports related to the Bitcoin blockchain are also out of scope for the Hiro bug bounty program.
Disclosure Policy
We kindly request that you adhere to the following guidelines when participating in our program:
Upon discovering a potential security issue, please notify us as soon as possible, and after the investigation and thorough evaluation, we will make every effort to resolve the issue promptly.
Please provide us with a reasonable amount of time to investigate and address the issue before disclosing it to the public or any third party. Our team is available Monday to Friday and will make a best effort to meet the following SLAs for hackers participating in our program:
First Response: 2 business days
Time to Triage: 7 business days
Time to Resolution: will depend on severity and complexity
Make a good faith effort to avoid privacy violations, data destruction, and interruption or degradation of our services. Only interact with accounts you own or with explicit permission from the account holder.
We request that you refrain from engaging in activities such as:
Denial of service attacks
Spamming
Social engineering (including phishing) targeting Hiro PBC staff or contractors
or any physical attempts against Hiro PBC property or data centers.
Thank you for your valuable contributions to maintaining the security of Hiro and our users. We greatly appreciate your efforts in helping us create a safe and reliable Stacks ecosystem.
80
Bug bounty programs / Hirevue Bug Bounty
« Last post by Angelina on July 20, 2023, 06:28:31 pm »
submit bug report

Email us about vulnerabilities at security@hirevue.com or submit reports at HackerOne. Please use our public key for all communication.
Rules for Testing HireVue
Do not email us requesting an invite to our private HackerOne program. If you've found an issue, email us (security@hirevue.com) with the basics and we'll send you an invite if it is an eligible finding.
Do not use any automated tools of any kind. It disrupts our service and the bugs found by them will all be duplicates.
Submit only bugs which you have actually tested and found a problem. Do not submit generic reports about a "possible" security problem. We need specific attack vectors.
Do not send us "Security Best Practices" reports. We already know about these.
Do not game the HackerOne system. Don't report bugs that don't exist just in case they do. We will work with HackerOne to ban your account.
Please only report issues that are very clearly security problems. If in doubt, don't submit it.
Do not harass us asking for rewards or bounties. We will offer you a bounty if your report is serious enough. We want to reward you for your work, but clicking a button on some tool you downloaded is not a way to get rewarded.
You may only email security@hirevue.com with findings. Do not spam public email addresses you've found online. We will report anyone who does this to HackerOne.
HireVue's marketing site (www.hirevue.com) is not within the scope of our product offering, any information provided with relation to that site will be treated as informational.
If we find that you're in violation of any of these rules we will reject your reports. We ask that you be respectful and we'll do the same.
Disclosure Policy
Let us know as soon as possible upon discovery of a potential security issue, and we'll make every effort to quickly resolve the issue.
Provide us a reasonable amount of time to resolve the issue before any disclosure to the public or a third-party.
Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service. Only interact with accounts you own or with explicit permission of the account holder.
Bounty Program
To show our appreciation of responsible security researchers, HireVue offers swag and/or monetary bounties for reports of qualifying security vulnerabilities. Reward amounts will vary based upon the severity of the reported vulnerability, and eligibility is at our sole discretion.
Exclusions
While researching, we'd like to ask you to refrain from:
Denial of service
Spamming
Social engineering (including phishing) of HireVue staff or contractors
Any physical attempts against HireVue property or data centers
HireVue's marketing site (www.hirevue.com) is not within the scope of our product offering, any information provided with relation to that site will be treated as informational.
Thank you for helping keep HireVue and our users safe!
Pages: 1 ... 6 7 [8] 9 10