Skip to content

Commit

Permalink
Add rules for known vulnerabilites
Browse files Browse the repository at this point in the history
  • Loading branch information
svenseeberg committed Sep 26, 2023
1 parent 1392513 commit fb56b48
Showing 1 changed file with 8 additions and 1 deletion.
9 changes: 8 additions & 1 deletion POLICY.txt
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,9 @@ reports one of the following problems:
- The vulnerability can be used to manipulate data within the service.
- XSS, CSRF, RCE, authentication/authorization bypass, SQL inections,
etc are considered relevant.
- Known vulnerabilities with a CVSS score greater than 7 that have not
yet been patched by the vendor and should therefore be mitigated by
other means until the patch is released and installed.

We will consider a vulnerability report most likely as NOT relevant if
it reports one of the following problems:
Expand All @@ -34,6 +37,8 @@ it reports one of the following problems:
- Publicly accessible version strings of used software.
- Security vulnerablities that can only be used within the scope of the
used account.
- The vulnerability exists in a third party software and is already
known.

4. Reporting Vulnerabilities

Expand All @@ -44,9 +49,11 @@ Please make sure that you include the following information:
- Which service is affected
- How can the bug be used/exploited
- Explanation of the risk
- If possible, include a estimated CVSS score

Reports will be answered within 48 hours. If you have not received an
answer within that time frame, feel free to contact us again.
answer within that time frame, feel free to contact us again. Please do
not ask for updates on a ticket repeatedly.

For used open source software, we recommend to file bug reports and/or
pull requests against the upstream repositories. This includes hardening
Expand Down

0 comments on commit fb56b48

Please sign in to comment.