Powered by:
Allows bounty splitting:
Average time to first program response: 6
Average time to bounty awarded null:
Average time to report resolved: 68
Handle veeam
Managed program: true
Name: Veeam
Offers bounties: false
Offers swag: false
Response efficiency percentage: 100
Submission state: open
Url: https://hackerone.com/veeam
Website: http://www.veeam.com
In scope:
Asset identifier: *.kasten.ioAsset type: URLAvailability requirement: Confidentiality requirement: Eligible for bounty: Eligible for submissions: trueInstruction: Integrity requirements: Max severity: critical
Asset identifier: *.veeam.comAsset type: URLAvailability requirement: Confidentiality requirement: Eligible for bounty: Eligible for submissions: trueInstruction: Integrity requirements: Max severity: critical
Asset identifier: *.veeamgov.comAsset type: URLAvailability requirement: Confidentiality requirement: Eligible for bounty: Eligible for submissions: trueInstruction: Integrity requirements: Max severity: critical
Asset identifier: Corporate InfrastructureAsset type: OTHERAvailability requirement: Confidentiality requirement: Eligible for bounty: Eligible for submissions: trueInstruction: Vulnerabilities in any Veeam owned/managed corporate infrastructure.Integrity requirements: Max severity: critical
Asset identifier: Product VulnerabilitiesAsset type: OTHERAvailability requirement: Confidentiality requirement: Eligible for bounty: Eligible for submissions: trueInstruction: Security vulnerabilities that are identified in currently supported Veeam products.Integrity requirements: Max severity: critical