Active Members dancezar Posted June 7, 2013 Active Members Report Posted June 7, 2013 (edited) Target: *avast.comExploit:Cross Site ScriptingTip: ReflectedTestat pe urmatoarele browsere:-Chrome-Opera-Firefox-SafariProof:View image: xss avast--Raportat Edited June 8, 2013 by danyweb09 Quote
Active Members akkiliON Posted June 7, 2013 Active Members Report Posted June 7, 2013 (edited) Nu primesti nimic pentru XSS-uri !Citeste bine !The avast! bug bounty programThe bounty program is designed for security-related bugs only. Namely, these bugs will qualify for the bounty (on the order of importance):Remote code execution. These are the most critical bugs.Local privilege escalation. That is, using avast! to e.g. gain admin rights from a non-admin account.Denial-of-service (DoS). In case of avast!, that would typically be BSODs or crashes of the AvastSvc.exe process.Escapes from the avast! Sandbox (via bugs in our code)Certain scanner bypasses. These include straightforward, clear bypasses (i.e. scenarios that lead to direct infection, with no additional user input), as opposed to things like deficiencies in the unpacking engine etc. In other words, we’re interested only in cases that cannot be mitigated by adding a new virus definition (please don’t report undetected malware)Other bugs with serious security implications (will be considered on a case by case basis).Poate o sa primesti o licenta ! In rest sa nu te astepti la bani Edited June 7, 2013 by akkiliON Quote