1Shoppingcart.com

  • Points – $2,500 per vulnerability
  • Up to $4,500 maximum reward
  • Partial safe harbor
  • Solo-Only

Program stats

  • Vulnerabilities rewarded 95
  • Validation within 3 days 75% of submissions are accepted or rejected within 3 days
  • Average payout $150 within the last 3 months

Latest hall of famers

Recently joined this program

Disclosure

Please note: This program does not allow disclosure. You may not release information about vulnerabilities found in this program to the public.

No technology is perfect and 1shoppingcart.com believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. We are excited for you to participate as a security researcher in order to identify weaknesses in our web applications. If you believe you've found a security issue, we encourage you to notify us. We welcome working with you to resolve the issue promptly.

Ratings/Rewards:

For the initial prioritization/rating of findings, this program will use the Bugcrowd Vulnerability Rating Taxonomy. However, it is important to note that in some cases a vulnerability priority will be modified due to its likelihood or impact. In any instance where an issue is downgraded, a full, detailed explanation will be provided to the researcher - along with the opportunity to appeal, and make a case for a higher priority.

Bonus Rewards:

In addition to the standard $2100-2500 reward range provided for P1 submissions, an additional $500 reward will be provided for any verified instances of remote code execution, and an additional $1000 for the successful upload and execution of an executable file type, e.g. .asp, .aspx, .ashx, etc. leading to RCE. These rewards are additive, i.e. they can be stacked on top of each other.


Report Formatting

In the Description of a Vulnerability Report, please format the replication process as an Ordered List. Valid reports, formatted the following way, will be prioritized and accepted faster by Newfold Digital:

Steps To Reproduce: (Add details for how we can reproduce the issue)

  1. [add step 1]
  2. [add step 2]
  3. [add step 3]...

Scope and rewards

Program rules

This program follows Bugcrowd’s standard disclosure terms.

For any testing issues (such as broken credentials, inaccessible application, or Bugcrowd Ninja email problems), please email support@bugcrowd.com. We will address your issue as soon as possible.

This program does not offer financial or point-based rewards for P5 — Informational findings. Learn more about Bugcrowd’s VRT.