46829 policies in database
Link to program      
2022-04-12
Ziff Davis logo
Thank
Gift
HOF
Reward

Ziff Davis

Introduction

This vulnerability disclosure process applies to any vulnerabilities you are considering reporting with regards to Ziff Davis and its portfolio of brands (the “Organization”).

We recommend reading this document fully before you report a vulnerability and always acting in compliance with it.

We are committed to maintaining the security of our systems and our customers’ information. We value those who take the time and effort to responsibly report security vulnerabilities according to the guidance in this document. Doing so makes our products and our customers safer. However, at this time we do not operate a public bug bounty program and we do not offer monetary rewards or compensation in exchange for vulnerability disclosures.

Reporting

In your report please include details of:

  • The location of the vulnerability (or the endpoint or URL with the vulnerability), which may require the software product name, version, and platform or the website address where the vulnerability can be observed.

  • A brief description of the type of vulnerability, for example; “XSS vulnerability on <domain name>”.

  • Steps to reproduce the vulnerability. These should be a benign, non-destructive, proof of concept. This helps to ensure that the report can be triaged quickly and accurately. It also reduces the likelihood of duplicate reports, or malicious exploitation of some vulnerabilities.

What to expect

After you have submitted your report, we will acknowledge (and/or provide an initial response to) your report within 10 working days. We’ll also aim to keep you informed of our progress.

Priority for remediation is assessed by looking at the impact, severity, and exploit complexity. Vulnerability reports might take some time to triage or address. You are welcome to inquire about the status but should avoid doing so more than once every 7 days. This allows our teams to focus on remediation.

We will notify you when the reported vulnerability is remediated, and you may be invited to confirm that the solution covers the vulnerability adequately.

Once your vulnerability has been resolved, we welcome requests to disclose your report. We would like to unify our guidance, so please do continue to coordinate a public release with us.

Guidelines

You must NOT:

  • Break any applicable laws or regulations.

  • Access unnecessary, excessive or significant amounts of data.

  • Modify data in the Organization's systems or services.

  • Use high-intensity, invasive, or destructive scanning tools to find vulnerabilities.

  • Attempt any form of denial of service, e.g. overwhelming a service with a high volume of requests, or resource exhaustion attacks.

  • Disrupt the Organization's services or systems.

  • Communicate any vulnerabilities or associated details other than by means described above in this document.

  • Social engineer, ‘phish’ or physically attack the Organization's staff or infrastructure unless specifically engaged to do so by Ziff Davis.

  • Demand financial compensation in order to disclose any vulnerabilities.

  • Please be aware that while we may accept reports detailing non-exploitable vulnerabilities, or reports indicating that the services do not fully align with “best practice”, for example missing security headers, these will generally be considered lower in priority and may not receive a response.

  • As this is a private program, please do not discuss this program or any vulnerabilities (even resolved ones) outside of the program without express consent from the organization.

  • Follow HackerOne's disclosure guidelines: (https://www.hackerone.com/disclosure-guidelines).

Out of scope vulnerabilities

When reporting vulnerabilities, please consider the following: (1) attack scenario/exploitability, and (2) security impact of the bug.

The following issues are considered out of scope:

  • Clickjacking on pages with no sensitive actions

  • Cross-Site Request Forgery (CSRF) on unauthenticated forms or forms with no sensitive actions

  • Attacks requiring MITM or physical access to a user's device.

  • Previously known vulnerable libraries without a working Proof of Concept.

  • Comma Separated Values (CSV) injection without demonstrating a vulnerability.

  • Missing best practices in SSL/TLS configuration.

  • Content spoofing and text injection issues without showing an attack vector/without being able to modify HTML/CSS

  • Rate limiting or brute-force issues on non-authentication endpoints

  • Missing best practices in Content Security Policy.

  • Missing HttpOnly or Secure flags on cookies

  • Missing email best practices (Invalid, incomplete, or missing SPF/DKIM/DMARC records, etc.)

  • Vulnerabilities only affecting users of outdated or unpatched browsers [Less than 2 stable versions behind the latest released stable version]

  • Software version disclosure / banner identification issues / descriptive error messages or headers (e.g. stack traces, application or server errors).

  • Tabnabbing

  • Open redirect - unless an additional security impact can be demonstrated

  • Issues that require unlikely user interaction

You must:

  • Always comply with data protection rules and must not violate the privacy of any data the Organization holds. You must not, for example, share, redistribute or fail to properly secure data retrieved from the systems or services.

  • Securely delete all data retrieved during your research as soon as it is no longer required or within 1 month of the vulnerability being resolved, whichever occurs first (or as otherwise required by data protection law).

Legalities

This policy is designed to be compatible with common vulnerability disclosure good practices. It does not give you permission to act in any manner that is inconsistent with the law, or which might cause the Organization or partner organizations to be in breach of any legal obligations.

Please note that this program should not be construed as encouragement or permission to perform any of the following activities:

  • Hack, penetrate, or otherwise attempt to gain unauthorized access to Ziff Davis’ or it’s subsidiaries’ applications, systems, or data in violation of applicable law;

  • Download, copy, disclose or use any proprietary or confidential data belonging to the Organization, including customer data; and

  • Adversely impact the Organization or the operation of the Organization’s applications or systems.

The Organization does not waive any rights or claims with respect to such activities.

In Scope

Scope Type Scope Name
application

Endpoint Security Cloud

ios_application

Encrypt.team

web_application

j2.com

web_application

j2global.com

web_application

ziffdavis.com

web_application

au.pcmag.com

web_application

www.ipvanish.com

web_application

ookla.com

web_application

pcmag.com

web_application

mashable.com

web_application

askmen.com

web_application

extremetech.com

web_application

offers.com

web_application

retailmenot.com

web_application

techbargains.com

web_application

blackfriday.com

web_application

theblackfriday.com

web_application

dealsofamerica.com

web_application

ign.com

web_application

howlongtobeat.com

web_application

humblebundle.com

web_application

speedtest.net

web_application

downdetector.com

web_application

toolbox.com

web_application

spiceworks.com

web_application

community.spiceworks.com

web_application

ekahau.com

web_application

everydayhealth.com

web_application

whattoexpect.com

web_application

medpagetoday.com

web_application

healthecareers.com

web_application

castleconnolly.com

web_application

babycenter.com

web_application

migraineagain.com

web_application

diabetesdaily.com

web_application

dailyom.com

web_application

primeinc.org

web_application

campaigner.com

web_application

smtp.com

web_application

ipvanish.com

web_application

uk.pcmag.com

web_application

computershopper.com

web_application

geek.com

web_application

bestblackfriday.com

web_application

insidecrm.com

web_application

itmanagement.com

web_application

itsecurity.com

web_application

voip-news.com

web_application

retailmenot.fr

web_application

ma-reduc.com

web_application

poulpeo.com

web_application

line2.com

web_application

icontact.com

web_application

kickbox.com

web_application

vipre.com

web_application

inspiredelearning.com

web_application

safesendsoftware.com

web_application

myvipre.com

web_application

threattrack.com

web_application

mailanyone.net

web_application

inspiredlms.com


This policy crawled by Onyphe on the 2022-04-12 is sorted as bounty.

FireBounty © 2015-2024

Legal notices | Privacy policy