dev-resources.site
for different kinds of informations.
Web vulnerability bounty rules update
Published at
11/20/2024
Categories
cybersecurity
security
testing
Author
TECNO Security
TECNO Security Response Center respects and thanks all security researchers for their contribution to TECNO security and for helping TECNO improve the security of its products and business. We will carefully evaluate every report and protect the interests of all security researchers to the greatest extent possible.
➡️Vulnerability Scope
Core Business
- www.tecno-mobile.com
- www.boomplay.com
- www.mobile-phantom.com
- account.palm.tech
- api-cloud.palm.tech
- auth-account.palm.tech
- cloud.palm.tech
- page.palm.tech
- tecno-find.palm.tech
➡️General Business
- security.tecno.com
- tspot.tecno.com
- www.carlcare.com
- pcconnection.online
- nebulalive.com
- transsion-os.com
- transsion-message.com
- vishavideo.com
- palm.tech
Bounty Reward
More details: TECNO Web Security Vulnerability Reward Rules V4.0
Articles
12 articles in total
Automated Penetration Testing: A Guide to Domain Collection
read article
【Activities Guide】A detailed overview of the TECNO Security Response Center's security incentive activities
read article
Guidelines about the Refer-a-Friend Program
read article
SQL Injection Principles, Vulnerability Discovery and Mitigation Strategies
read article
TECNO SRC Security Vulnerability Submission Function Survey
read article
Unveiling the Unseen: A Journey from Simple Recon Using Shodan to Leaking AWS Secrets
read article
Web vulnerability bounty rules update
currently reading
【Vulnerability Campaign】Earn Your Thanksgiving Bonus Rebate
read article
Critical File Upload Vulnerabilities: Exploits and Mitigation Strategies
read article
[2024 Thanksgiving] Security Technology Research Writing Activity
read article
Guide to Writing Security Technology Blog Articles
read article
Hacking your first OAuth on the Web application
read article
Featured ones: