46830 policies in database
Link to program      
2019-10-25
2019-11-20
lemlist logo
Thank
Gift
HOF
Reward

lemlist

lemlist is committed to working with security experts across the globe to stay up to date with the latest security techniques. If you have discovered a security issue that you believe we should know about, we'd welcome working with you. Please let us know about it and we'll make every effort to quickly correct the issue.

Disclosure Policy

  • Let us know as soon as possible upon discovery of a potential security issue, and we'll make every effort to quickly resolve the issue.

  • Provide us a reasonable amount of time to resolve the issue before any disclosure to the public or a third-party.

  • Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service. Only interact with accounts you own or with explicit permission of the account holder.

DO NOT use automated scanning tools

Exclusions

While researching, we'd like to ask you to refrain from:

  • Denial of service

  • Spamming

  • Social engineering (including phishing) of lemlist staff, contractors or customers

  • Physical access to a lemlist user computer

  • Any physical attempts against lemlist property or data centers

  • Login/Logout CSRF

  • Self-XSS (we require evidence on how the XSS can be used to attack another lemlist user)

  • Miss of rate limits

  • Report from automated tools and scans

  • Vulnerabilities sending spam or unauthorised messages

  • Bugs in 3rd party software

  • X-Frame-Options related

  • Customer's sites

  • Relating to HSTS

  • DNSSEC

  • Missing security headers which do not lead directly to a vulnerability

  • Physical attack on the infrastructure

  • Theoretical attacks

  • Breaking of SSL/TLS trust

  • Compromising of browser/device (ex. computer sharing, physical access to a user's device, ...)

  • Vulnerabilities only affecting users of outdated or unpatched browsers and platforms

  • Password and account recovery policies, such as reset link expiration or password complexity

  • Vulnerabilities without solution on our side (HEIST, ...)

  • Outdated DNS record pointing to system which does not belong to lemlist

Scope

  • Website and API related endpoints on app.lemlist.com

Eligibility

  • You must be the first reporter of the vulnerability.

  • You follow https://hackerone.com/disclosure-guidelines

  • You do not access data of other users and solely use your created accounts.

  • You may not publicly disclose the vulnerability prior to our resolution.

  • You are not an individual on, or residing in any country on, any U.S. sanctions lists.

  • You provide a working proof of concept that exploits the security issue.

Safe Harbor

Any activities conducted in a manner consistent with this policy will be considered authorized conduct and we will not initiate legal action against you. If legal action is initiated by a third party against you in connection with activities conducted under this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.

Thank you for helping keep lemlist and our users safe!

In Scope

Scope Type Scope Name
web_application

app.lemlist.com


Firebounty have crawled on 2019-10-25 the program lemlist on the platform Hackerone.

FireBounty © 2015-2024

Legal notices | Privacy policy