Instruction: Applications packaged and in scope are:
* DataStax Enterprise (DSE) [Server, Analytics, Graph, Search]
Vulnerabilities in scope:
* Loss of availability, confidentiality, or integrity of the data from unauthenticated side-channel or protocol attacks on the DSE server (attacks on the native or storage ports)
* Privilege escalation, or loss of tenancy within CQL
Vulnerabilities out of scope:
* JMX related vulnerabilities
* DDOS attacks using large or high throughput payloads
Integrity requirements: high
Max severity: critical
Asset identifier: https://astra.datastax.com
Asset type: URL
Availability requirement:
Confidentiality requirement:
Eligible for bounty: true
Eligible for submissions: true
Instruction:
Integrity requirements:
Max severity: critical
Asset identifier: https://docs.datastax.com/
Asset type: URL
Availability requirement: low
Confidentiality requirement: low
Eligible for bounty: true
Eligible for submissions: true
Instruction: *Automated Scanning Prohibited*
Integrity requirements: high
Max severity: critical
Asset identifier: https://downloads.datastax.com
Asset type: URL
Availability requirement: medium
Confidentiality requirement: none
Eligible for bounty: true
Eligible for submissions: true
Instruction: *Automated Scanning Prohibited*
Our downloads site available for the general public.
Open directory listings with read only access is not in scope.