A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way that specific situations are handled in bug bounties.
223
stars
10
forks
source link
feat(readme): added clause about zero day exploits #3
This is a situation I often find myself in when assessing vendor products for 0days and submitting vulnerabilities to bug bounty programs running the vendor software.
Feel free to discuss if you think the wording should be changed or if this rule needs more clarity.
This is a situation I often find myself in when assessing vendor products for 0days and submitting vulnerabilities to bug bounty programs running the vendor software.
Feel free to discuss if you think the wording should be changed or if this rule needs more clarity.
Thanks for making this repo!