Out of scope
Out of scope are trivial vulnerabilities or bugs that cannot be abused. The following is a non-exhaustive list of examples of these vulnerabilities:
- No authentication (anonymous access) for public FTP servers, especially mirrors for open-source projects.
- Disclosure of publicly available software or source code.
- HTTP 404 codes/pages or other HTTP non-200 codes/pages and Content Spoofing/Text Injection on these pages.
- Fingerprint and other ways to detect versions that are disclosed on common/public services.
- Missing limits on login attempts.
- Clickjacking and issues that are only exploitable through clickjacking.
- Lack of Secure/HTTP-Only flags on non-sensitive Cookies.
- OPTIONS HTTP method enabled.
- anything related to HTTP security headers, e.g.:
- Strict-Transport-Security.
- X-Frame-Options.
- X-XSS-Protection.
- X-Content-Type-Options.
- Content-Security-Policy.
- SSL Configuration Issues:
- SSL forward secrecy not enabled.
- weak/insecure cipher suites.
- SPF, DKIM, DMARC issues.
- Host header injection.
- Reporting older versions of any software without proof of concept or working exploit.
- Information leakage in metadata.
- Systems and protocols that can be used in DDoS attacks.
Also, reports considered a beg bounty will not be processed nor responded to.