• Points per vulnerability
  • Partial safe harbor
  • Managed by Bugcrowd

Program stats

123 vulnerabilities rewarded

Validation within 2 days
75% of submissions are accepted or rejected within 2 days

Latest hall of famers

Recently joined this program

(ISC)² is an international, nonprofit membership association for information security leaders like you. We’re committed to helping our members learn, grow and thrive. More than 125,000 certified members strong, we empower professionals who touch every aspect of information security. Visit www.isc2.org for more information.

Our vision is supported by our commitment to educate and reach the general public through our charitable foundation - The Center for Cyber Safety and Education ™ Follow us on Twitter or connect with us on Facebook.

Updated July 30

All Open Amazon Buckets will receive a minimum of a P1 rating and rewarded accordingly.

This program only awards points for VRT based submissions.


In scope

Target name Type
https://www.isc2.org Other
iamcybersafe.org Website Testing
https://vulnerability.isc2.org Other

Out of scope

Target name Type
https://isc2latamcongress.com Website Testing
https://learn.isc2.org Website Testing
https://community.isc2.org Website Testing
blog.isc2.org Website Testing

Please use your (ISC)² member credentials when conducting your tests.

Program rules

This program follows Bugcrowd’s standard disclosure terms.

Learn more about Bugcrowd’s VRT.

This bounty requires explicit permission to disclose the results of a submission.

We are aware of the following finding types. They are specifically excluded from the bounty:

- Descriptive error messages (e.g. Stack Traces, application or server errors).
- Login Page / Forgot Password Page Account Brute force or account lockout not enforced.
- HTTP 404 codes/pages or other HTTP non-200 codes/pages.
- Banner disclosure on common/public services.
- Disclosure of known public files or directories, (e.g. robots.txt).
- Clickjacking and issues only exploitable through clickjacking.
- Self-XSS and issues exploitable only through Self-XSS.
- CSRF on forms that are available to anonymous users (e.g. the contact form).
- Logout Cross-Site Request Forgery (logout CSRF).
- Presence of application or web browser ‘autocomplete’ or ‘save password