Addition of 6 new scopes :
Renaming of 5 scopes
dev.comptage.zecible.fr to ywh.comptage.zecible.fr
Note Bleue via its Zecible brand provides companies with a selection of prospecting files of professionals and individuals :
33 million B2C profiles with many profiling criteria (age, income, sex, interests, etc.)
11 million companies (head offices, establishments, turnover, workforce, sector of activity, etc.)
1.9 million direct contacts of Executives, Decision-makers, and Executives classified by function and service
We have a team of in-house developers, who will be ready to be responsive to your reports and work collaboratively with you if you think you have identified a security bug.
Although we pay attention to the security aspects of our servers and applications, we also know that nothing is infallible...
We are pleased to work with qualified people to help us identify the weaknesses of our technology.
Any type of denial of service attack is strictly prohibited, as well as any interference with our network, equipment or infrastructure.
We do not want the discoveries to be disclosed to the public or to a third party.
We want to financially reward all those who submit valid reports to us and help us improve the security of our services. The eligibility requirements for receiving rewards after discoveries of deficiencies are as follows :
You must be the first person to reveal a valid vulnerability (not every duplicate report will be rewarded),
The vulnerability must be an acceptable vulnerability associated with a site or server in "Scope".
Any vulnerabilities found must be reported within 24 hours of discovery and only through the Bug bounty program at www.yeswehack.com
You must not publicly disclose any vulnerabilities,
You must send a clear textual description of the report and the steps to follow to reproduce the issue, including attachments such as screenshots or proof of concept code if necessary.
You must not perform tests that could cause a degradation or interruption of our service (avoid using automated tools, and limit yourself to a maximum of 2 requests per second).
You must not disclose, manipulate, extract or destroy any user data or any data to which you have access.
You must not be a former or current employee of Zecible or one of its subcontractors.
Please focus on qualifying vulnerabilities
We intend to respond and resolve the reported issues as quickly as possible. Depending on our workload and the severity of the issue, you can expect an update from us within 24 to 96 hours maximum following the initial submission date of the report.
Zecible reserves the right to modify the terms of this program or terminate it at any time.
All information from the databases.
Any private information about our customers, employees or one of our vendors / subcontractors.
Zecible will provide rewards to eligible reporters of qualifying vulnerabilities.
Reward amounts may vary depending upon the severity of the vulnerability reported and based on the CVSS environmental score (Zecible will rate the base, temporal and environmental CVSS metrics).
Zecible will determine in its sole discretion whether a reward should be granted and the amount of the reward.
If you think you’ve found a vulnerability, please do not publicly disclose these details outside of this process without explicit permission. Please include the following details with your report and be as descriptive as possible :
Vulnerability Location & Type - The exact location(vulnerable URLs and parameters) and the nature of the vulnerability;
Steps to Reproduce - A detailed description of the steps required to reproduce the vulnerability (screenshots, compressed screen recordings, and proof-of-concept scripts are all helpful); and
Attack Scenario - A relevant example attack scenario explaining the prerequisites to the attack, and its exact impact in a realistic context.
Some scopes are restricted (IP/Login/Password) and reserved for internal use. They are supposed to be accessed only by Zecible and are strictly confidential.
It is therefore expected that you do not (easily) access them... We included them in the public program in order to test the accuracy of the defined restrictions.
Here are all the scopes concerned :
In the context of this program, we do not intend to encourage, accept or reward reports of leaks that are not applicable to our program’s scope and identified outside of our program’s scope, such as:
Also, in order not to encourage dark and grey economies, in particular the purchase, resale and trade of identifiers or stolen information, as well as all types of dangerous behavior (e.g. social engineering, ...), we will not accept or reward any report based on information whose source is not the result of failure on the part of our organization or one of our employees/service providers.
This excludes, but is not limited to:
Reports of exposed secrets, credentials and sensitive information will be considered eligible if it complies with the following :
Impact is in-scope | Impact is out-of-scope | |
---|---|---|
Source of leak is in-scope | Eligible | Eligible |
Source of leak belongs to Zecible but is out-of-scope | Eligible | Not Eligible |
Source of leak does not belong to Zecible and is out-of-scope | Not Eligible | Not Eligible |
As a complement to the Program’s rules and testing policy :
Scope Type | Scope Name |
---|---|
web_application | ywh.comptage.zecible.fr |
web_application | ywh.static.zecible.fr |
web_application | ywh.fichiers.zecible.fr |
web_application | ywh.mydata.zecible.fr |
web_application | ywh.admin.zecible.fr |
web_application | ywh.api.zecible.fr |
web_application | ywh.dev.zecible.fr |
web_application | ywh.crons.zecible.fr |
web_application | ywh.routage.zecible.fr |
web_application | ywh.update.zecible.fr |
web_application | registre.notebleue.pro |
web_application | svn.notebleue.pro |
web_application | todo.notebleue.pro |
web_application | webtoolbox.notebleue.pro |
web_application | cam.notebleue.pro |
web_application | odoo14.notebleue.pro |
web_application | serveur12.notebleue.com |
Scope Type | Scope Name |
---|---|
undefined | Anything that is not listed explicitly in the scope. |
undefined | Vulnerabilities reported on other services or applications are not allowed. |
Firebounty have crawled on 2020-04-22 the program ZECIBLE PUBLIC BUG BOUNTY PROGRAM on the platform Yeswehack.
FireBounty © 2015-2024