Report Security Issue
If found a security vulnerability on www.thesmartfurniture.com we encourage you to message us
immediately.
resolve
bounty program, reward guidelines, and what
If you the principles below when reporting a security issue to www.thesmartfurniture.com we will not initiate a lawsuit or investigation against you in response to your report.
We ask that:
1.You give us reasonable time to review and repair
information about the report or sharing such information with others.
2.You don’t interact with
the account) if the account owner has not consented to such actions.
3.You make
(but not limited to) destruction
4.You do not exploit a security issue you discover for any reason. (This includes demonstrating
additional risk,
5.You do not violate
BOUNTY PROGRAM
We recognize and reward security researchers who help us keep people safe by reporting
vulnerabilities in our services. Monetary bounties for such reports are entirely at www.thesmartfurniture.com discretion, risk, impact, and other factors. To potentially qualify for a bounty,
1.Adhere to our
2.Report a security bug:
creates a security or privacy risk. (Note that www.thesmartfurniture.com ultimately determines of an
issue,
3.Submit your report via our security center. Please
4.If you inadvertently cause a privacy violation or disruption (such as accessing account data,
service configurations, or other confidential information) while investigating
5.We investigate and
though, we prioritize evaluations
6.We reserve
REWARDS
Our rewards are
improve on.
1.Please provide detailed reports with reproducible steps. If the report
2.When duplicates occur, we award
3.Multiple vulnerabilities caused by one underlying issue
4.We determine bounty reward
impact,
these are listed under.
5.Amounts below are
are at our discretion.
Critical severity Vulnerabilities ($200): Vulnerabilities that cause a privilege escalation on the platform from unprivileged to admin, allows remote code execution, financial theft, etc.
Examples:
·Remote Code Execution
·Remote Shell/Command Execution
Vertical Authentication bypass
·SQL Injection that leaks targeted data
·Get full access to accounts
High severity Vulnerabilities ($100): Vulnerabilities that affect
Examples:
·Lateral authentication bypass
·Disclosure of important information within
·Stored XSS
·Local file inclusion
·Insecure handling of authentication cookies
Medium severity Vulnerabilities ($50): Vulnerabilities that affect multiple users,
Examples:
·Common logic design flaws and business process defects
·Insecure
Low severity Vulnerabilities: Issues that affect singular users
prerequisites (MITM) to trigger.
Examples:
·Open redirect
·Reflective XSS
·Low sensitivity Information leaks
Customer Support 24/7
📧 Mail: [email protected]
📞 Phone : 9138502155