REPORT SECURITY ISSUES
REPORT SECURITY ISSUES
If you've found a security vulnerability on theplaygroundnz.com, we encourage you to message us immediately. we'll review all legitimate vulnerability reports
If you suits the principles below when reporting a security issue to theplaygroundnz.com us we'll not initiate a lawsuit or enforcement investigation against you in response to your report.
We ask that:
1.You give us reasonable time to review and repair
information about the report or sharing such information with others.
2.You don’t interact with
3.You make an honest faith effort to avoid privacy violations and disruptions to others, including
(but not limited to) destruction
4.You do not exploit a security issue you discover for any reason. (This includes demonstrating
additional risk, like attempted compromise of sensitive company data or trying
5.You do not violate
We recognize and reward security researchers who help us keep people safe by reporting
vulnerabilities in our services. Monetary bounties for such reports are entirely at theplaygroundnz.com
discretion, supported risk, impact, and other factors. To potentially qualify for a bounty, you
1.Adhere to our fundamentals (see above).
2.Report a security bug: that's , identify a vulnerability in our services or infrastructure which creates a security or privacy risk. (Note that theplaygroundnz.com ultimately determines the danger of an issue, which many bugs aren't security issues.)
3.Submit your report via our security center. Please don't contact employees.
4.If you inadvertently cause a privacy violation or disruption (such as accessing account data, service configurations, or other confidential information) while investigating
5.We investigate and answer all valid reports.
Our rewards are supported the impact of a vulnerability. we'll update the program over time
supported feedback, so please give us feedback on any
that that we'll improve on.
1.Please provide detailed reports with reproducible steps. If the report isn't detailed enough to
2.When duplicates occur, we award
3.Multiple vulnerabilities caused by one underlying issue
4.We determine bounty reward supported
5.Amounts below are the utmost we'll pay per level. We aim to be fair, all reward amounts are at our discretion.
Critical severity Vulnerabilities ($200): Vulnerabilities that cause a privilege escalation on the
platform from unprivileged to admin, allows remote code execution, financial theft, etc.
·Remote Code Execution
·Remote Shell/Command Execution
·Vertical Authentication bypass
·SQL Injection that leaks targeted data
·Get full access to accounts
High severity Vulnerabilities ($100): Vulnerabilities that affect
including the processes it supports.
·Lateral authentication bypass
·Disclosure of important information within
·Stored XSS for
·Local file inclusion
·Insecure handling of authentication cookies
Medium severity Vulnerabilities ($50): Vulnerabilities that affect multiple users,
no user interaction to trigger.
·Common logic design flaws and business process defects
·Insecure object of the verb References
Low severity Vulnerabilities: Issues that affect singular users
prerequisites (MITM) to trigger.
·Low sensitivity Information leaks
Customer Support 24/7