Banner object (1)

Hack and Take the Cash !

844 bounties in database
  Back Link to program      
02/02/2018
passhash logo
Thanks
Gift
Hall of Fame
Reward

passhash

No technology is perfect, and passhash believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our product or service, we encourage you to notify us. We welcome working with you to resolve the issue promptly.

Disclosure Policy

  • Let us know as soon as possible upon discovery of a potential security issue, and we'll make every effort to quickly resolve the issue.
  • Provide us a reasonable amount of time to resolve the issue before any disclosure to the public or a third-party.
  • Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service. Only interact with accounts you own or with explicit permission of the account holder.

Thank you for helping keep passhash and our users safe!

In Scope

Scope Type Scope Name
undefined
  • Design flaws which could be exploited
undefined
  • Insecure default config/settings
undefined
  • Usage of insecure (deprecated) algorithms
undefined
  • Poor/incorrect usage of a package/dependency resulting in a vulnerability
undefined
  • Denial of service
undefined
  • Spamming
undefined
  • Social engineering (including phishing) of passhash staff or contractors
undefined
  • Any physical attempts against passhash property or data centers
undefined
  • Vulnerabilities with source code host/provider (e.g. github)
undefined
  • Vulnerabilities where the root cause is upstream (e.g. a dependency with a vulnerability)
undefined
  • Design flaws which could be exploited
undefined
  • Insecure default config/settings
undefined
  • Usage of insecure (deprecated) algorithms
undefined
  • Poor/incorrect usage of a package/dependency resulting in a vulnerability
undefined
  • Denial of service
undefined
  • Spamming
undefined
  • Social engineering (including phishing) of passhash staff or contractors
undefined
  • Any physical attempts against passhash property or data centers
undefined
  • Vulnerabilities with source code host/provider (e.g. github)
undefined
  • Vulnerabilities where the root cause is upstream (e.g. a dependency with a vulnerability)
web_application

https://github.com/dhui/passhash


This program leverage 21 scopes, in 2 scopes categories.

FireBounty © 2015-2019

Legal notices