Bug Bounties

Veeam

Powered by: 

Allows bounty splitting: 

Average time to first program response: 6

Average time to bounty awarded null: 

Average time to report resolved: 68

Handle veeam

Managed program: true

Name: Veeam

Offers bounties: false

Offers swag: false

Response efficiency percentage: 100

Submission state: open

Url: https://hackerone.com/veeam

Website: http://www.veeam.com

In scope:

  • Asset identifier: *.kasten.io
  • Asset type: URL
  • Availability requirement: 
  • Confidentiality requirement: 
  • Eligible for bounty: 
  • Eligible for submissions: true
  • Instruction: 
  • Integrity requirements: 
  • Max severity: critical



  • Asset identifier: *.veeam.com
  • Asset type: URL
  • Availability requirement: 
  • Confidentiality requirement: 
  • Eligible for bounty: 
  • Eligible for submissions: true
  • Instruction: 
  • Integrity requirements: 
  • Max severity: critical



  • Asset identifier: *.veeamgov.com
  • Asset type: URL
  • Availability requirement: 
  • Confidentiality requirement: 
  • Eligible for bounty: 
  • Eligible for submissions: true
  • Instruction: 
  • Integrity requirements: 
  • Max severity: critical



  • Asset identifier: Corporate Infrastructure
  • Asset type: OTHER
  • Availability requirement: 
  • Confidentiality requirement: 
  • Eligible for bounty: 
  • Eligible for submissions: true
  • Instruction: Vulnerabilities in any Veeam owned/managed corporate infrastructure.
  • Integrity requirements: 
  • Max severity: critical



  • Asset identifier: Product Vulnerabilities
  • Asset type: OTHER
  • Availability requirement: 
  • Confidentiality requirement: 
  • Eligible for bounty: 
  • Eligible for submissions: true
  • Instruction: Security vulnerabilities that are identified in currently supported Veeam products.
  • Integrity requirements: 
  • Max severity: critical