-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add rules for known vulnerabilites #3
base: main
Are you sure you want to change the base?
Conversation
fb56b48
to
0f111d9
Compare
@@ -34,6 +37,8 @@ it reports one of the following problems: | |||
- Publicly accessible version strings of used software. | |||
- Security vulnerablities that can only be used within the scope of the | |||
used account. | |||
- The vulnerability exists in a third party software and is already |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That would exclude about everything. What about something along the lines of:
- The vulnerability is known and has a CVSS score less than 7
- Deviations from best practices or common configuration that do not have a direct security impact
|
||
For used open source software, we recommend to file bug reports and/or | ||
pull requests against the upstream repositories. This includes hardening | ||
instructions in the installation documentation. | ||
|
||
If you are reporting a known vulnerability, please include a reference | ||
to the original vulnerability report. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
... and/or a CVE number.
Please stick to the methods defined out in the Common Vulnerability Scoring System (CVSS) for defining the criticality of a vulnerability.
|
||
For used open source software, we recommend to file bug reports and/or | ||
pull requests against the upstream repositories. This includes hardening | ||
instructions in the installation documentation. | ||
|
||
If you are reporting a known vulnerability, please include a reference | ||
to the original vulnerability report. | ||
|
||
5. Bug Bounties / Vulnerability Rewards | ||
|
||
The amount of the reward payed depends on the severity of the found |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Only responsible disclosures and reports adhering to this policy are eligible for a reward.
No description provided.