Site.pro
  • Website Builder
    • Website Builder
    • Prices
    • Website Import
    • Online Stores
    • Plugins
    • Collaboration
    • Templates
    • Languages
    • Affiliate Program
    • Examples
    • AI Website Builder
    • For Design Studios
    • We Build for You
  • Domains
  • Email
  • Learn
    • Tutorials
    • Blog
    • FAQ
    • Growth Hacking
    • For Hostings
    • Domainity
    • For Education
  • For Resellers
    • Prices
    • White Label
    • Revenue Share
    • Panels
    • How it Works
    • Mass Import
    • Our Partners
    • Reselling Examples
    • Marketing Materials
    • Documentation
    • Free Websites
  • Website Builder
    • Website BuilderEverybody can easily create a website, landing page, or e-commerce store. Easy-to-use website builder.
    • PricesSite.pro Prices: Templates 200+, Websites, Basic Builder Functions, Online Stores, Get more website builder features.
    • Website ImportTransfer your existing website from anywhere to Site.pro website builder. Website import from different website builders.
    • Online StoresSell your goods or services anywhere on the website
    • PluginsMany functions and plugins depending on geographical preferences. Plugin description.
    • CollaborationCollaborative Website Builder, Create a website with teammates in real-time in one space, Real-Time Collaboration.
    • Templates
    • Languages
    • Affiliate Program
    • Examples
    • AI Website Builder
    • For Design Studios
    • We Build for You
  • Domains
  • Email
  • Learn
    • TutorialsVideos for Beginners. Download video tutorials for free New video tutorial.
    • BlogWebsite Builder Lifehacks: Shared hosting tips. Web Design, Marketing
    • FAQHelp center. Payment Issues. Basic Tutorial. Quick search. Have questions? Enter your question here.
    • Growth HackingBoost your sales. Strategy
    • For HostingsEducation. Generate more website builder sales
    • DomainityDomainity: Domain quantity per 1000 people
    • For EducationFree Website Builder for Online and Offline Classrooms. Collaborate with students in one space or separately.
  • For ResellersWhite Label
    • PricesStart reselling. Pay for live websites. Free Websites. Join reselling program.
    • White LabelThe most popular white label tool is ideal for reselling
    • Revenue ShareWebsite Builder: Provide free website builder and earn 50% commissions
    • PanelsOne product for all platforms. Download plugin for your panel
    • How it WorksCloud or On-Premises. Recommendations for Builder Server. Requirements for builder server (On-premises only) and published websites.
    • Marketing MaterialsVideo. Mockups. Website Blocks. Marketing Materials.
    • Mass Import
    • Our Partners
    • Reselling Examples
    • Documentation
    • Free Websites
  • Register

    Register

    (Buy Domain, Create email)
    (For Hosting Companies)
    By registering, you accept our Terms of Service
    Number of Customers: 1-100
    Number of Customers: 1-100
  • Log in

    Log in

    New user? Create account
    Forgot password?
  • $
  • English

Bug Bounty Program

Scope

  • Domain: site.pro (only on main domain, no subdomains, like "tw.site.pro" and any other)
  • Registration in bounty program required
  • Report the vulnerability bug by creating a ticket (choose any available category)

Vulnerabilities

  • Unauthorized access to project servers (vulnerabilities that leads to remote code execution RCE);
  • XSS vulnerabilities on the assets with critical functionality (with proven script execution);
  • Server-side vulnerability with information disclosure (for ex. memory leaks or insecure direct object references) of critical or highly confidential data;
  • Authentication bypass or privilege escalation;
  • Injection vulnerabilities;
  • Any other vulnerability that can lead to loss of user privacy.

Issues considered out of scope:

  • Disclosure of non-sensitive information (for ex. project version) and information that does not present significant risk;
  • Reports of missed protection mechanism / best current practice (for ex. no CSRF token, framing/clickjacking protection, tabnabbing) without demonstration of real security impact for user or system;
  • Cross-Site Request Forgery (CSRF) on unauthenticated forms or forms with no sensitive actions;
  • CSRF on self-hosted servers, unless proved to be present on public server;
  • Self-XSS;
  • Remaining EXIF data in images that are uploaded to the service;
  • Attacks requiring MITM or physical access to a user's device;
  • Content spoofing and text injection issues without showing an attack vector;
  • Missing best practices in SSL/TLS configuration or in Content Security Policy;
  • Missing HttpOnly or Secure flags on cookies;
  • Missing DNSSEC on the domain;
  • Missing email best practices (Invalid, incomplete or missing SPF/DKIM/DMARC records, etc.);
  • Missing rate-limit methods without demonstration of real security impact for user or system;
  • Insecure password complexity requirements;
  • Vulnerabilities related to 3rd-party software unless they lead to vulnerability in our scope;
  • Vulnerabilities involving stolen credentials;
  • Phishing and social engenering;
  • Issues that require unlikely victim interaction not causing any harm to that victim;
  • Providing publicly leaked sensitive user data without demonstration of a specific vulnerability, which causes leak of that data, and which is currently reproducible on the website;
  • Related problems (with the same core) that were reported and confirmed previously;
  • Publicly disclosed issues.

Program Rules

  • If you think you have found a security vulnerability — please provide us detailed reports with reproducible steps. If the report is not detailed enough to reproduce the issue, the issue will not be eligible for a reward.
  • Submit one vulnerability per report, unless you need to chain vulnerabilities to provide impact.
  • When duplicates occur, we only award the first report that was received.
  • Multiple vulnerabilities caused by one underlying issue will be awarded one bounty.
  • Social engineering (phishing and etc.) is prohibited.
  • Vulnerability must be original and previously unreported.
  • Do not perform any attack that could harm the reliability or integrity of our services or data.
  • Avoid scanning techniques that are likely to cause degradation of service to our customers (for ex. DDoS, spamming).
  • Refrain from stealing and disclosure user's private information.

Disclosure Policy

  • Let us know as soon as possible upon discovery of a potential security issue, and we'll make every effort to quickly resolve the issue.
  • Provide us a reasonable amount of time to resolve the issue before any disclosure to the public or a third-party.
  • Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service. Only interact with accounts you own or with explicit permission of the account holder.

Amount of Reward

In determining the amount of payout, we will take into account the level of risk and impact of the vulnerability:

  • Critical: 400—500 EUR. Server or database direct access. Full access to administrative resources.
  • High: 200—300 EUR. Possibility to modify any data of other users.
  • Medium: 100—200 EUR. Perform actions on other users behalf with no victim interaction. View critical user data like payments or contact details.
  • Low: 10—100 EUR. Any other unlikely action from user perspective causing harm to that user and/or bringing benefit for the attacker.

You will receive the funds in your account within 10 working days after providing an invoice.
An invoice must contain the following "Bill to" information:

JSC "B1.lt"
Company code: 304868214
VAT code: LT100011744514
Address: Taikos pr. 52C, Klaipeda. Lithuania
© Site.pro 2011. Website Builder. United States.
Contact SalesTerms of Service