We believe in the power of the security research community to assist us with
our commitment to maintaining the best possible security posture. To this end,
Memset has contracted with Bugcrowd to assist us in working with the research
community in the most mutually effective, frictionless and transparent manner.
Report the issues you identify clearly and fully
Including proof of concept or a detailed explanation to assist us with recreating the issue
Keep identified issues confidential
Comply with the scoping and identification criteria below
Bear with us. We will treat your findings responsibly and prioritise them accordingly
Protect our and customers’ data – If you find sensitive data not intended for you, stop and report it immediately.
The only rewards we currently provide are kudos on the Bugcrowd platform.
_For the initial prioritization/rating of findings, this program will use
the[Bugcrowd Vulnerability Rating
Taxonomy](https://bugcrowd.com/vulnerability-rating-taxonomy). However, it is
important to note that in some cases a vulnerability priority will be modified
due to its likelihood or impact. In any instance where an issue is downgraded,
a full, detailed explanation will be provided to the researcher - along with
the opportunity to appeal, and make a case for a higher priority._
This program only awards points for VRT based submissions.
Target name | Type
*.memset.com | Other
*.bofhs.net | Other
_Any domain/property of Memset not listed in the targets section is out of
scope. This includes any/all subdomains not listed above._
DoS or DDoS
Destructive or performance-impacting attacks or testing
Social engineering of any kind
Submissions that do not pertain to Memset’s assets
Flaws specific to unpatched browsers or plugins
Simple, non-XSS content injection
Missing security-related flags on non-security impacting cookies
Simple rate-limiting issues without a security impact
Submissions entirely comprising output from commonly available automated scanners
**When conducting vulnerability research according to this policy, we consider
this research to be:**
Authorized in accordance with the Computer Fraud and Abuse Act (CFAA) (and/or similar state laws), and we will not initiate or support legal action against you for accidental, good faith violations of this policy;
Exempt from the Digital Millennium Copyright Act (DMCA), and we will not bring a claim against you for circumvention of technology controls;
Exempt from restrictions in our Terms & Conditions that would interfere with conducting security research, and we waive those restrictions on a limited basis for work done under this policy; and
Lawful, helpful to the overall security of the Internet, and conducted in good faith.
You are expected, as always, to comply with all applicable laws.
_If at any time you have concerns or are uncertain whether your security
research is consistent with this policy, please submit a report through this
program, or inquire via email@example.com before going any further._
This program follows Bugcrowd’s [standard disclosure
This program does not offer financial or point-based rewards for P5 —
Informational findings. [Learn more about Bugcrowd’s VRT](https://bugcrowd.com/vulnerability-