No technology is perfect and 1shoppingcart.com believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. We are excited for you to participate as a security researcher in order to identify weaknesses in our web applications. If you believe you've found a security issue, we encourage you to notify us. We welcome working with you to resolve the issue promptly.
For the initial prioritization/rating of findings, this program will use the Bugcrowd Vulnerability Rating Taxonomy. However, it is important to note that in some cases a vulnerability priority will be modified due to its likelihood or impact. In any instance where an issue is downgraded, a full, detailed explanation will be provided to the researcher - along with the opportunity to appeal, and make a case for a higher priority.
In addition to the standard $2100-2500 reward range provided for P1 submissions, an additional $500 reward will be provided for any verified instances of remote code execution, and an additional $1000 for the successful upload and execution of an executable file type, e.g. .asp, .aspx, .ashx, etc. leading to RCE. These rewards are additive, i.e. they can be stacked on top of each other.
In the Description of a Vulnerability Report, please format the replication process as an Ordered List. Valid reports, formatted the following way, will be prioritized and accepted faster by Newfold Digital:
Steps To Reproduce: (Add details for how we can reproduce the issue)
- [add step 1]
- [add step 2]
- [add step 3]...
Scope and rewards
This program follows Bugcrowd’s standard disclosure terms.
For any testing issues (such as broken credentials, inaccessible application, or Bugcrowd Ninja email problems), please email firstname.lastname@example.org. We will address your issue as soon as possible.
This program does not offer financial or point-based rewards for P5 — Informational findings. Learn more about Bugcrowd’s VRT.