Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Scroll export button
scopecurrent
template-id0fa09813-8b86-460a-aa1d-ef450a80e9ce
quick-starttrue
add-onScroll PDF Exporter

Info

'This document provides information about Wildix Vulnerability Reward Program ( Bug Bounty )Program, including scope, eligibility, exclusions and rewards. 

Created: May 2023

Updated: June 2024

Permalink: https://wildix.atlassian.net/wiki/x/AQAoCw


Warning

Important: Please note that the email for sending vulnerability reports has changed to bugbounty@wildix.com


Table of Contents

Objective

...

  • Overusing automated tools
  • DDoS/DoS attacks
  • Spamming/Phishing attacks
  • Accessible non-sensitive files and directories (e.g., README.TXT, CHANGES.TXT, robots.txt, .gitignore, etc.)
  • Missing flags on cookies
  • Missing HTTP security headers
  • Clickjacking and issues only exploitable through clickjacking
  • Missing SPF, DKIM, DMARC, and DMARC CAA records in the DNS zone
  • Disabled DNSSEC
  • Cross-Site Request Forgery (CSRF) on unauthenticated forms or forms with no security impact
  • Descriptive error messages and patch disclosure with no security impact
  • Rate limiting or brute force issues
  • Software version disclosure
  • Outdated software
  • Reporting known-vulnerable components without proof of exploitation
  • General low-severity issues reported by automated scanners

...

The highest reward may be obtained for the findings like RCE, Authentication bypass, Vertical Privilege Escalation, and SQLi.

Bug Bounty reward can be paid to PayPal account only.

Reporting

All vulnerability reports should be submitted to security@wildixbugbounty@wildix.com and  and contain the description and steps to reproduce or PoC. Reports submitted through other channels (such as email or social media) will not be eligible for rewards.

...