
For more information about adding collaborators, see Researcher Collaboration. This section is displayed only if the program is not solo. Add their user name and define the reward split between each researcher. In Collaborate, add researchers who have collaborated on this submission. You can attach multiple files (up to 20). In Attachments, it is strongly recommended to upload illustrative evidence that shows proof of the vulnerability, preferably in the form of a POC video showing the vulnerability in the Program Owner’s system or screenshots at minimum. You can also click selecting link and select an image or a video that you want to embed. You can embed images and videos by dragging & dropping or pasting them. It indicates the number of characters you can continue to type. When the number of characters that you can type is 25 or fewer, a word counter is displayed warning you that you are reaching the maximum limit. Demonstrated Impact - Add information about the risk and the impact of the vulnerability.Vulnerability Evidence - Provide illustrative evidence in the form of screenshots or videos that shows proof of the vulnerability.
#Mathboard report bug how to#

In Description, describe the vulnerability and its impact. In URL/Location of vulnerability, specify the location of the vulnerability, such as the URL. You can type to filter the list by match.

This drop-down displays the options based on VRT ( Vulnerability Rating Taxonomy). Select the Technical Severity of the vulnerability. Repeatedly testing outside the approved scope will result in loss of program access or platform privileges. Submitting against a target that is listed as Out of Scope will result in a -1 point adjustment. Out of Scope Targets: Before selecting Other, see the program’s brief and make sure that the affected target is not listed as Out of Scope or does not include other similar instructions. It is strongly recommended that you provide this every time you submit.Īttach proof-of-concept scripts, screenshots, screen recordings, and so on. This is one of the most impactful things you can do to provide context around your submission. Provide illustrative evidence in the form of screenshots or videos that shows proof of the vulnerability. Add clear and descriptive replication steps so that the organization can easily reproduce and validate your findings. Description: Provide detailed information about the vulnerability. URL/Location of vulnerability: Location in the application where you have discovered the bug. The severity rating suggested by VRT is not guaranteed to be the severity rating applied to your submission once impact is considered.

It is important that you choose the correct type so that the organization understands the risk from the bug. The Vulnerability Rating Taxonomy Classification identifies the kind of bug you have found based on our VRT, our baseline priority rating system for common bugs found on bug bounty programs. Identifies the specific target that is affected by the bug you have found.
#Mathboard report bug code#
For example, “Remote File Inclusion in Resume Upload Form allows remote code execution” is more descriptive and helpful than “RFI Injection found.” It must provide a brief overview of the type of bug found, where it was found, and the overall impact. The report must contain the following information at a minimum: Section name This not only helps quickly reproduce the issue but moves your submission through the review process faster, with no delays due to missing information. You can upload any files or logs as supporting evidence. Generally, you have to explain where the bug was found, who it affects, how to reproduce it, the parameters it affects, and provide Proof-of-Concept supporting information. When you find a bug or vulnerability, you must file a report to disclose your findings. Review the Disclosure Policy for the Program.Updating Submission on Multiple Devices.
