The applications running on these websites are in scope, but testing the Web Application Firewall itself is out of scope. Please note that several of our services are behind a Web Application Firewall and may appear that way in a DNS lookup. We frequently redirect subdomains to third-party providers. If you're unsure whether a particular domain or subdomain is served by TechSmith, please look up the DNS record for it. If you identify a vulnerability on a domain or subdomain owned by TechSmith that is not explicitly mentioned here, you may still report it to us, but it may not be eligible for rewards. If we're unable to reproduce the issue, we'll reach out for further clarification on the vulnerability.If your vulnerability involves leaving malicious entries or files on a TechSmith property, please delete or hide them once they're no longer needed for demonstrating the vulnerability. Never destroy or otherwise tamper with TechSmith customer data that does not belong to you.Test with your own accounts where possible.' Make a good-faith effort to avoid violating the privacy of TechSmith customer data.Avoid disclosing the vulnerability publicly or to any third-parties until the issue is resolved.Please write a thorough report with step by step instructions to reproduce the vulnerability. Together, our vigilant expertise promotes the continued security and privacy of TechSmith customers, products, and services. TechSmith believes effective disclosure of security vulnerabilities requires mutual trust, respect, transparency and common good between TechSmith and Security Researchers. TechSmith's Vulnerability Disclosure Policy If you have discovered a vulnerability in a TechSmith product, please review the following TechSmith Vulnerability Disclosure Policy and then use the form below to report it. Report a Security Vulnerability to TechSmith
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |