Any reproducible vulnerability that has a severe effect on the security or privacy of our users is likely to be in scope for the program. Common examples include XSS, CSRF, SSRF, RCE, SQLi, and privilege escalation. When a particular request/URL causes effective DoS with 1 hit per 60 seconds.
| Class of Vulnerability | Bounty (in EUR) | Extra Terms (if any) |
|---|---|---|
| XSS, SSRF, Clickjacking, IDOR | 200 | |
| CSRF | 200 | If user data can be manipulated through 3rd party websites. |
| SQL Injection | 400 | |
| Capturing a user account | 400 | Brute-forcing, phishing or MITM are not applicable. Using XSS or Clickjacking: the lesser bounty will take precedence. |
| Severe DoS opportunity | 400 | |
| Remote code execution/login | 750 | |
| Remote code execution as root | 1500 | |
| Any of the above when caused by a 3rd party bug with a fix available for 48h or longer | 200 | |
| Any of the above when caused by a 3rd party bug where the fix was available within 48h | 0 | Because we’ll hopefully fix that automatically. |