Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

For more information on how Google's third-party cookies operate and handle your data, see: Google Privacy Policy

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.

Bounties and assets
Bounties
Low
0.1 - 3.9
Medium
4.0 - 6.9
High
7.0 - 8.9
Critical
9.0 - 9.4
Exceptional
9.5 - 10.0
Tier 2
min. €
max. €
0
1
2
3
4
5
6
7
8
9
Tier 5
min. €
max. €
0
1
2
3
4
5
6
7
8
9
Assets
iOS

*.test.com

Tier 2
Wildcard

test

Tier 5
Device
Description

Demo program description

No industry set

In scope

We are happy to announce our first bug bounty program! We've done our best to clean most of our known issues and now would like to request your help to spot the once we missed! We are specifically looking for

  • leaking of personal data
  • horizontal / vertical privilege escalation
  • SQLi
  • ...

Below you can find a list of what’s currently in scope.
We plan to update our scope every month so keep an eye on us or subscribe to our program to receive updates when we do!

Out of scope

General

  • Best practices concerns
  • Highly speculative reports about theoretical damage. Proof it and be concrete.
  • DDoS or any kind of Brute Forcing Attacks* Publicly accessible login panels
  • Reports that state that software is out of date/vulnerable without proven exploitable risks
  • Vulnerabilities as reported by automated tools without additional analysis as to how they're an issue in the context of our tool
  • Physical or social engineering attempts (this includes phishing attacks against employees)

Application

  • Stack trace information
  • Open redirects
  • XSS issues in non-current browsers (older than 3 versions)
  • Self-XSS that cannot be used to exploit other users (this includes having a user paste JavaScript into the browser console)
  • Missing cookie flags on non-security sensitive cookies
  • Missing security headers which do not present an immediate security vulnerability
  • Banner grabbing issues (figuring out what web server we use, etc)
  • Clickjacking
  • Username/email enumeration via register, login or forgot password messages
  • Host header injection

Infrastructure

  • Open ports without an accompanying proof-of-concept demonstrating vulnerability
  • Recently disclosed 0-dayvulnerabilities in commercial products where no patch or a recent patch is available. We need time to patch our systems just like everyone else -please give us 2 weeks before reporting these types of issues.
  • Weak SSL configurations and SSL/TLS scan reports (this means output from sites such as SSL Labs)
  • Missing SPF, DCIM or DMARC records
Rules of engagement

Our promise to you

  • We will respond to report in ultimately two weeks, probably faster!
  • We are happy to respond to any questions, please use the button in the right top corner for this.
  • We respect the safe harbour clause that you can find below

Your promise to us

  • Provide detailed but to-the point reproduction steps* Include a clear attack scenario. How will this affect us exactly?
  • Remember: quality over quantity!
  • Please do not discuss or post vulnerabilities without our consent (including PoC's on YouTube and Vimeo)
  • Please do not use automatic scanners -be creative and do it yourself! We cannot accept any submissions found by using automatic scanners. Scanners also won't improve your skills, and can cause a high server load (we'd like to put our time in thanking researchers rather than blocking their IP's 😉)
Severity assessment

Exceptional

  • RCE (Remote Code Execution)

Critical

  • Access to all customer personal data
  • SQL injection

High

  • Stored XSS without user interaction
  • Privilege escalation
  • Authentication bypass on critical infrastructure

Medium

  • XSS
  • CSRF with a significant impact

Low

  • XSS that requires lots of user interaction ( > 3 steps)
  • CSRF with a very limited impact
FAQ

Please select one of the sections below and remove the sections that are not applicable for you

Where can we get credentials for the app?

You can self-register on the application but please don’t forget to use your @intigriti.me address.

Where can we get credentials for the app?

You can use the get credentials button in the right top corner to request credentials that are ready to use! Feel free to reach out to support if you have any issue with these credentials.

Where can we get credentials for the app?

We currently don’t offer any credentials to test user roles.

Submission questions
test 1
Yes/No
test 2
Options
  • aaaaaaaaaaaaaaaaaa
  • bbbbbbbbbbbbbbbbbbb
  • cccccccccccccccccccccccccccc
test 3
Free-text
Yes yes yes!
Your program is live and you can invite researchers
Invite only programs will only be visible to researchers that are specifically invited by the company to take part in the program. These researchers can be found and managed in the program researchers tab. Feel free to have a look and add some more researchers to the program now!
Stay in touch!

Keep your community of researchers up to speed on the latest news about your program and make sure to post regular program updates!

budget left
€47,732
budget in validation:
€1,256
budget spent:
€11,012
total budget:
€60,000
circle of trust
Researchers

Currently 3 researchers are member of this program.


accepted invites:
4 / 4
accepted applications:
0 / 0
by accepted submission:
0
average payout
€859
accepted submissions
8 / 17
Created at 6-2-2023, 17:52:26
Last updated at 30-4-2025, 11:59:44