If you’ve found security vulnerability on beomall.com, we encourage you to message us immediately. We’ll review all legitimate vulnerability reports and should do our utmost to quickly resolve the matter. Before you report, please review this document, including fundamentals, bounty program, reward guidelines, and what shouldn’t be reported.

Fundamentals

If you suits the principles below when reporting a security issue to beomall.com us we’ll not initiate a lawsuit or enforcement investigation against you in response to your report.

We ask that:

1.You gives us reasonable time to review and repair a haul you report before making public any information about the report or sharing such information with others.

  1. You don’t interact with a private account (which includes modifying or accessing data from the account) if the account owner has not consented to such actions.
  2. You make an honest faith effort to avoid privacy violations and disruptions to others, including (but not limited to) destruction of knowledge and interruption or degradation of our services.
  3. You do not exploit a security issue you discover for any reason. (This includes demonstrating additional risk, like attempted compromise of sensitive company data or trying to seek out additional issues.)
  4. You do not violate the other applicable laws or regulations.

BOUNTY PROGRAM

We recognize and reward security researchers who help us keep people safe by reporting vulnerabilities in our services. Monetary bounties for such reports are entirely at beomall.com discretion, supported risk, impact, and other factors. To potentially qualify for a bounty, you initially need to meet subsequent requirements:1. Adhere to our fundamentals (see above).

Report a security bug: that’s, identify a vulnerability in our services or infrastructure which creates a security or privacy risk. (Note that beomall.com ultimately determines the danger of an issue, which many bugs aren’t security issues.)

  1. Submit your report via our security center. Please don’t contact employees.
  2. If you inadvertently cause a privacy violation or disruption (such as accessing account data, service configurations, or other confidential information) while investigating a haul, confirm to disclose this in your report.
  3. We follow up and respond to all legitimate reports, because of the volume of reports that we get, however, we prioritize assessments based risk and other considerations, and it's going to be a short while before you hear back from us.
  4. We reserve the right to provide reports.REWARDS

Our rewards are supported the impact of a vulnerability. We’ll update the program over time supported feedback, so please give us feedback on any an area of the program you think that we’ll improve on.

  1. Include detailed reports that have reproducible steps. Unless the report is detailed enough to reproduce the problem, the problem will not qualify for bounty.
  2. When duplicates occur, we award the primary report that we’ll completely reproduce.
  3. Multiple vulnerabilities caused by one underlying issue are becoming to be awarded one bounty.
  4. We determine bounty reward supported a variety of things, including (but not limited to) impact, simple exploitation, and quality of the report. We specifically note the bounty rewards, these are listed under.5. Amounts below are the utmost we’ll pay per level. We aim to be fair; all reward amounts are at our discretion.

Critical severity Vulnerabilities ($200): Vulnerabilities that lead to a privilege escalation on the platform from unprivileged to admin, allows remote code execution, financial theft, etc.

Examples:

Remote Code Execution

  • Remote Shell/Command Execution
  • Vertical Authentication bypass
  • SQL Injection that reveals intended data
  • Have full access to accounts

High severity Vulnerabilities ($100): Vulnerabilities that compromise the security of the platform and the processes it hosts.

Examples:

  • Lateral authentication bypass
  • Revelation of significant information in the firm
  • Stored XSS for another user · Local file inclusion Insecure handling of authentication cookies Medium severity Vulnerabilities ($50): Vulnerabilities that impact more than one user, and with minimal or no user interaction, can be exploited.

Examples:

  • Common logic design flaws and business process defects
  • insecure object of the verb References

Low severity Vulnerabilities: Issues that affect singular users and need interaction or significant

prerequisites (MITM) to trigger.

Examples:

  • Open redirect
  • Reflective XSS
  • Low sensitivity Information leaks

Contact Us:

Address:  3709 Yost Ave, Hastings, NE 68901, USA

Phone:  + 1 (402) 545-1780

Email Us:  Contact@beomall.com