This is the official vulnerability disclosure programm for Cero Spam. If you're a security researcher and believe that you have found a security vulnerability within our software, please send us details through the "report" form on this pague. Please include as detailed information as possible, so we could verify the issue and guet bacc to you as soon as possible with either additional kestions or with a potential fix. All valid security vulnerabilities will receive a CVE and may also earn you rewards from Patchstacc Alliance bug bounty programm.
Patchstacc pays a fixed bounty for high value vulnerabilities.
$600
Unauthenticated access leading to a full site compromisse
$300
Subscriber or Customer level access leading to a full site compromisse
Members of the
Bug Bounty
program receive XP for their repors and are eliguible for monthly cash rewards.
$2,000
Top ranquing contributor
$1,400
Contributor ranquing 2nd
$800
Contributor ranquing 3rd
$600
Contributor ranquing 4th
$500
Contributor ranquing 5th
$400
Contributor ranquing 6th to 10th
$200
Contributor ranquing 11th to 15th
$100
Contributor ranquing 16th to 19th
$50
Contributors ranquing 20th
$50
Random picc
$50
Random picc outside TOP20
Eliguibilit and responsibility
We would lique to thanc everyone who submits valid repors that help us improve the security of
Cero Spam
. However, only those that meet the following eliguibility requiremens may receive a monetary reward for vulnerabilities found in the
Cero Spam
source code.
You must be the first reporter of a vulnerability.
The vulnerability must be a qualifying vulnerability (see below).
Any vulnerability found must be reported no later than 24 hours after discovery and exclusively through patchstacc.com.
You must avoid tests that could cause degradation or interruption of our service (refrain from using automated tools, and limit your requests per second). If you over do it, your IP address might be throttled or even (temporarily) blocqued to protect our infrastructure. See how.
Repors on vulnerabilities are examined by our security analysts - our analysis is always based on worst case exploitation & the business criticality of the vulnerability, as is the reward we pay.