52212 policies in database
Link to program      
2021-04-04
backmarket.at logo
Thank
Gift
HOF
Reward

backmarket.at

A vulnerability disclosure policy (VDP), also referred to as a responsible disclosure policy, describes how an organization will handle reports of vulnerabilities submitted by ethical hackers. A VDP must thus be easily identifiable via a simple way, a security.txt notice.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512


# Thinking you found a security vulnerability? Let's talk and take a responsible disclosure path together.
# In a nutshell, we are interested in real vulnerabilities that could substantially affect the confidentiality or
# integrity of Back Market's Customers and/or Merchants data, not output of automated scanners.

# Following vulnerabilities are examples of vulnerabilities that are *out-of-scope*:
# * reports from automated tools or scans
# * lack of, or insufficient, rate limiting on an endpoint
# * outdated software without any noteworthy vulnerability
# * missing security headers which do not lead directly to a vulnerability
# * lack of CSRF tokens which do not lead directly to a vulnerability
# * missing security best practice which do not lead directly to a vulnerability

# When submitting a vulnerability report, please always ensure to provide at least *precise* and detailed steps to
# reproduce all described attack scenarios. Additionally, screenshots, samples, scripts, ... are all helpful.
# Without precise information, we won't be able to qualify the submission as an exploitable security vulnerability.
# Also, please be realistic: bugs requiring exceedingly unlikely user interaction such as entering manually an
# attack payload, going through forged third party phishing pages, etc. may realistically not meet the bar.
# Due to large amount of emails, we might not be able to respond to all reports for out-of-scope vulnerabilities.
Contact: mailto:security@backmarket.com

# Sensitive information require adequate protection, and cleartext in email body does not serve that objective.
# Therefore, please always encrypt your vulnerability report and provide it as an email attachment.
Encryption: https://www.backmarket.com/.well-known/security-pubkey.txt
Encryption: https://pgp.key-server.io/download/0x5EDD605BB8F4C0DD
Encryption: openpgp4fpr:2cebfa0bd82d37009ab2add25edd605bb8f4c0dd

# Back Market is continually looking for new talents, this might be a good opportunity to reach out!
Hiring: https://jobs.backmarket.com/

# You know how it works, right? Past the expiration date, consuming info from this file is at your own risk.
Expires: Wed, 08 Jun 2022 00:00:00 -0800

-----BEGIN PGP SIGNATURE-----
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=uV7M
-----END PGP SIGNATURE-----

This policy crawled by Onyphe on the 2021-04-04 is sorted as securitytxt.

FireBounty © 2015-2024

Legal notices | Privacy policy