(ISC)²

  • Points per vulnerability
  • Partial safe harbor
  • Managed by Bugcrowd

Program stats

128 vulnerabilities rewarded

Validation within about 12 hours
75% of submissions are accepted or rejected within about 12 hours

Latest hall of famers

Recently joined this program

Disclosure

Please note: This program does not allow disclosure. You may not release information about vulnerabilities found in this program to the public.

(ISC)² is an international, nonprofit membership association for information security leaders like you. We’re committed to helping our members learn, grow and thrive. More than 125,000 certified members strong, we empower professionals who touch every aspect of information security. Visit www.isc2.org for more information.

Our vision is supported by our commitment to educate and reach the general public through our charitable foundation - The Center for Cyber Safety and Education ™ Follow us on Twitter or connect with us on Facebook.

Updated July 30

All Open Amazon Buckets will receive a minimum of a P1 rating and rewarded accordingly.

This program only awards points for VRT based submissions.

Targets

In scope

Target name Type Tags
https://www.isc2.org Other
  • Windows
  • ASP.NET
  • jQuery
  • RequireJS
  • Microsoft IIS
https://vulnerability.isc2.org Other
  • Windows
  • Bootstrap
  • ASP.NET
  • Vue.js
  • jQuery
  • RequireJS
  • Microsoft IIS

Out of scope

Target name Type
iamcybersafe.org Website Testing
https://isc2latamcongress.com Website Testing
https://learn.isc2.org Website Testing
https://community.isc2.org Website Testing
blog.isc2.org Website Testing

Please use your (ISC)² member credentials when conducting your tests.

Program rules

This program follows Bugcrowd’s standard disclosure terms.

Learn more about Bugcrowd’s VRT.

This bounty requires explicit permission to disclose the results of a submission.

We are aware of the following finding types. They are specifically excluded from the bounty:

- Descriptive error messages (e.g. Stack Traces, application or server errors).
- Login Page / Forgot Password Page Account Brute force or account lockout not enforced.
- HTTP 404 codes/pages or other HTTP non-200 codes/pages.
- Banner disclosure on common/public services.
- Disclosure of known public files or directories, (e.g. robots.txt).
- Clickjacking and issues only exploitable through clickjacking.
- Self-XSS and issues exploitable only through Self-XSS.
- CSRF on forms that are available to anonymous users (e.g. the contact form).
- Logout Cross-Site Request Forgery (logout CSRF).
- Presence of application or web browser ‘autocomplete’ or ‘save password