<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Geizhals Bug Bounty</title>
    <link>http://forum.geizhals.at/feed.jsp?id=836538</link>
    <description>Geizhals-Forum</description>
    <item>
      <title>Re(4): Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7504762.html#7504762</link>
      <description>So artet es bei uns nicht aus. Wir sind ja keine Hochschule mit einigen hunderten Meme begeisterten Personen. &lt;img src="teeth.gif" width="16" height="19" align="absmiddle" alt="|-D"/&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 05 Aug 2015 05:54:59 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7504762.html#7504762</guid>
      <dc:creator>Instar</dc:creator>
      <dc:date>2015-08-05T05:54:59Z</dc:date>
    </item>
    <item>
      <title>Re(4): Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7504760.html#7504760</link>
      <description>Hallo,&lt;br&gt;&lt;br&gt;die Apps werden von einem getrennten Team betreut.&amp;nbsp;&amp;nbsp;Für User nicht sichtbar wird daran gearbeitet. &lt;img src="smile.gif" width="16" height="19" align="absmiddle" alt=":-)"/&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 05 Aug 2015 05:52:59 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7504760.html#7504760</guid>
      <dc:creator>Instar</dc:creator>
      <dc:date>2015-08-05T05:52:59Z</dc:date>
    </item>
    <item>
      <title>Re(3): Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7504683.html#7504683</link>
      <description>&lt;br&gt;ist eigentlich die neue android app und die interfaces jetzt auch im scope? lg&lt;br/&gt;</description>
      <pubDate>Tue, 04 Aug 2015 17:31:51 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7504683.html#7504683</guid>
      <dc:creator>*patrick star*</dc:creator>
      <dc:date>2015-08-04T17:31:51Z</dc:date>
    </item>
    <item>
      <title>Re(3): Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7504595.html#7504595</link>
      <description>Techniker ist informiert &lt;img src="hornsmile.gif" width="16" height="26" align="absmiddle" alt="&amp;gt;&amp;#58;-&amp;#41;"/&gt;&lt;br&gt;&lt;a href="http://www.kraftfuttermischwerk.de/blogg/wp-content/uploads2/2015/01/XwdPXVi.jpg" target="_blank"&gt;&lt;img src="http://www.kraftfuttermischwerk.de/blogg/wp-content/uploads2/2015/01/XwdPXVi.jpg" width="550px"/&gt;&lt;/a&gt;&lt;br&gt;&lt;br&gt;mfg&lt;br&gt;m3xx &lt;img src="hornsmile.gif" width="16" height="26" align="absmiddle" alt="&amp;gt;&amp;#58;-&amp;#41;"/&gt;&lt;br/&gt;</description>
      <pubDate>Tue, 04 Aug 2015 14:46:21 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7504595.html#7504595</guid>
      <dc:creator>m3xx</dc:creator>
      <dc:date>2015-08-04T14:46:21Z</dc:date>
    </item>
    <item>
      <title>Re(4): Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7503976.html#7503976</link>
      <description>Bitte, kein Problem. Wäre noch schneller gegangen wenn ich nicht nachfragen hätte müssen. &lt;img src="zwinker.gif" width="16" height="19" align="absmiddle" alt=";-)"/&gt; &lt;img src="smile.gif" width="16" height="19" align="absmiddle" alt=":-)"/&gt;&lt;br/&gt;</description>
      <pubDate>Mon, 03 Aug 2015 09:37:09 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7503976.html#7503976</guid>
      <dc:creator>Instar</dc:creator>
      <dc:date>2015-08-03T09:37:09Z</dc:date>
    </item>
    <item>
      <title>Re(3): Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7503975.html#7503975</link>
      <description>Kein Problem! Danke für die schnelle Antwort &lt;img src="smile.gif" width="16" height="19" align="absmiddle" alt=":-)"/&gt; &lt;br/&gt;</description>
      <pubDate>Mon, 03 Aug 2015 09:34:44 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7503975.html#7503975</guid>
      <dc:creator>x264</dc:creator>
      <dc:date>2015-08-03T09:34:44Z</dc:date>
    </item>
    <item>
      <title>Re(2): Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7503971.html#7503971</link>
      <description>Hallo,&lt;br&gt;&lt;br&gt;einer unserer Techniker sitzt an dem Problem und du wirst heute im laufe des Tages eine Antwort bekommen.&lt;br&gt;&lt;br&gt;Entschuldigung für die Verzögerung vorige Woche hatten die Herren einige dringende Deadlines. &lt;img src="cry.gif" width="16" height="19" align="absmiddle" alt=":~("/&gt;&lt;br/&gt;</description>
      <pubDate>Mon, 03 Aug 2015 09:29:34 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7503971.html#7503971</guid>
      <dc:creator>Instar</dc:creator>
      <dc:date>2015-08-03T09:29:34Z</dc:date>
    </item>
    <item>
      <title>Re: Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7503918.html#7503918</link>
      <description>Schaut sich die Emails noch wer an? Ist jetzt fast eine Woche her...und gefixt ist auch noch nix &lt;img src="schief.gif" width="16" height="19" align="absmiddle" alt=":-/"/&gt;&lt;br/&gt;</description>
      <pubDate>Mon, 03 Aug 2015 07:36:48 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7503918.html#7503918</guid>
      <dc:creator>x264</dc:creator>
      <dc:date>2015-08-03T07:36:48Z</dc:date>
    </item>
    <item>
      <title>Re(5): Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7330061.html#7330061</link>
      <description>Nein, bisher maximal XSS, XSRF ... Also für die User unsicher.&lt;br&gt;&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Fri, 15 Aug 2014 08:36:31 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7330061.html#7330061</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2014-08-15T08:36:31Z</dc:date>
    </item>
    <item>
      <title>Re(5): Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7330062.html#7330062</link>
      <description>Nein, bisher maximal XSS, CSRF ... Also für die User unsicher.&lt;br&gt;&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Fri, 15 Aug 2014 08:36:31 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7330062.html#7330062</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2014-08-15T08:36:31Z</dc:date>
    </item>
    <item>
      <title>Re(4): Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7330055.html#7330055</link>
      <description>War denn bis jetzt ein richtiger "Bock" dabei? Also eine Zugriffsmöglichkeit aufs System o. ä. ? &lt;br/&gt;</description>
      <pubDate>Fri, 15 Aug 2014 08:16:00 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7330055.html#7330055</guid>
      <dc:creator>MotzTussy</dc:creator>
      <dc:date>2014-08-15T08:16:00Z</dc:date>
    </item>
    <item>
      <title>Re(3): Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7329987.html#7329987</link>
      <description>Ist nicht vollständig (war zu faul &lt;img src="schief.gif" width="16" height="19" align="absmiddle" alt=":-/"/&gt;), in Summe grob ca. 5000 EUR oder so bisher...&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Thu, 14 Aug 2014 23:35:41 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7329987.html#7329987</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2014-08-14T23:35:41Z</dc:date>
    </item>
    <item>
      <title>Re(2): Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7329877.html#7329877</link>
      <description>&lt;a href="https://forum.geizhals.at/t836538,7207987.html#7207987" rel="noopener" target="_blank"&gt;https:/&lt;wbr/&gt;/&lt;wbr/&gt;forum.geizhals.at/&lt;wbr/&gt;t836538,7207987.html#7207987&lt;/a&gt; &lt;br/&gt;</description>
      <pubDate>Thu, 14 Aug 2014 18:07:10 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7329877.html#7329877</guid>
      <dc:creator>TuxTux</dc:creator>
      <dc:date>2014-08-14T18:07:10Z</dc:date>
    </item>
    <item>
      <title>Re: Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7329874.html#7329874</link>
      <description>Darf man fragen, wie viel ihr schon auszahlen durftet?&lt;br/&gt;</description>
      <pubDate>Thu, 14 Aug 2014 18:03:20 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7329874.html#7329874</guid>
      <dc:creator>zeddicus</dc:creator>
      <dc:date>2014-08-14T18:03:20Z</dc:date>
    </item>
    <item>
      <title>Re(4): Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7192623.html#7192623</link>
      <description>kruzefix musst du alles verraten &lt;img src="angry.gif" width="16" height="19" align="absmiddle" alt="&amp;gt;-("/&gt;&lt;br&gt;&lt;br&gt;wer weiß was der chefe springen hät lassen &lt;img src="teeth.gif" width="16" height="19" align="absmiddle" alt="|-D"/&gt;&lt;br/&gt;</description>
      <pubDate>Thu, 12 Dec 2013 09:13:44 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7192623.html#7192623</guid>
      <dc:creator>bono_d70</dc:creator>
      <dc:date>2013-12-12T09:13:44Z</dc:date>
    </item>
    <item>
      <title>Re(3): Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7192622.html#7192622</link>
      <description>&lt;blockquote&gt;&lt;em&gt; Hast du das jetzt extra dafür gemalt?&lt;br&gt;&lt;/em&gt;&lt;/blockquote&gt;&lt;br&gt;&lt;br&gt;was bekomm ich wenn ich ja dagen würd als belohnung? &lt;img src="glasses.gif" width="16" height="19" align="absmiddle" alt="8-)"/&gt;&lt;br&gt;&lt;br&gt;(kleiner tipp: ein roomba ist immer was nützliches &lt;img src="hornteeth.gif" width="16" height="26" align="absmiddle" alt="&amp;gt;&amp;#58;-D"/&gt; ) &lt;br&gt;&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Thu, 12 Dec 2013 09:13:14 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7192622.html#7192622</guid>
      <dc:creator>bono_d70</dc:creator>
      <dc:date>2013-12-12T09:13:14Z</dc:date>
    </item>
    <item>
      <title>Re(3): Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7192620.html#7192620</link>
      <description>&lt;a href="http://www.elektrojournal.at/cartoons-20269.html" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;www.elektrojournal.at/&lt;wbr/&gt;cartoons-20269.html&lt;/a&gt; &lt;br/&gt;</description>
      <pubDate>Thu, 12 Dec 2013 09:11:11 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7192620.html#7192620</guid>
      <dc:creator>hellbringer</dc:creator>
      <dc:date>2013-12-12T09:11:11Z</dc:date>
    </item>
    <item>
      <title>Re(2): Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7192616.html#7192616</link>
      <description>Hast du das jetzt extra dafür gemalt?&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Thu, 12 Dec 2013 09:05:09 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7192616.html#7192616</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-12T09:05:09Z</dc:date>
    </item>
    <item>
      <title>Re: Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7192611.html#7192611</link>
      <description>Geht schon! Bin bereit einzuhacken&amp;nbsp;&amp;nbsp;&lt;img src="teeth.gif" width="16" height="19" align="absmiddle" alt="|-D"/&gt;&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;img src="files/111014/030924_geizhals.jpg"/&gt;&lt;br/&gt;</description>
      <pubDate>Thu, 12 Dec 2013 09:00:07 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7192611.html#7192611</guid>
      <dc:creator>bono_d70</dc:creator>
      <dc:date>2013-12-12T09:00:07Z</dc:date>
    </item>
    <item>
      <title>Re: Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7192456.html#7192456</link>
      <description>vom Inhalt versteh nur soviel, als daß Bugs an GH reported werden sollen.&lt;br&gt;&lt;br&gt;Aber 50€ für einen Bug scheint mir wirklich SEHR GEIZhals&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 21:26:16 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7192456.html#7192456</guid>
      <dc:creator>AVS_reloaded</dc:creator>
      <dc:date>2013-12-11T21:26:16Z</dc:date>
    </item>
    <item>
      <title>Known/Disclosed Bugs</title>
      <link>http://forum.geizhals.at/t836538,7193389.html#7193389</link>
      <description>2013-12-13: &lt;br&gt;* Forum: XSS in 404-Google-search JS (@christypriory)&lt;br&gt;* Forum: XSS #2 (@christypriory)&lt;br&gt;* Forum: XSS #3 (-"-)&lt;br&gt;* Forum: XSS #4 (-"-)&lt;br&gt;* Forum: CSRF 1-4 (-"-)&lt;br&gt;* Forum: Clickjacking (-"-)&lt;br&gt;* Geizhals: XSS #1 (-"-)&lt;br&gt;* unternehmen.geizhals.at XSS #1 (-"-)&lt;br&gt;* sensitive HTTP information disclosure #1 (-"-)&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:52:59 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7193389.html#7193389</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:52:59Z</dc:date>
    </item>
    <item>
      <title>Known/Disclosed Bugs</title>
      <link>http://forum.geizhals.at/t836538,7200663.html#7200663</link>
      <description>2013-12-13: &lt;br&gt;* Forum: XSS in 404-Google-search JS (@christypriory)&lt;br&gt;* Forum: XSS #2 (@christypriory)&lt;br&gt;* Forum: XSS #3 (-"-)&lt;br&gt;* Forum: XSS #4 (-"-)&lt;br&gt;* Forum: CSRF 1-4 (-"-)&lt;br&gt;* Forum: Clickjacking (-"-)&lt;br&gt;* Geizhals: XSS #1 (-"-)&lt;br&gt;* unternehmen.geizhals.at XSS #1 (-"-)&lt;br&gt;* sensitive HTTP information disclosure #1 (-"-)&lt;br&gt;* gewinnspiel/cenowarka/konkurs XSS&amp;nbsp;&amp;nbsp;(-"-)&lt;br&gt;* Forum: tomcat example servlets possible session manipulation (-"-)&lt;br&gt;* Forum: URL redirection (-"-)&lt;br&gt;&lt;br&gt;2013-12-15: &lt;br&gt;* Geizhals: CSRF Wishlist creation (was known, but still ...) (@christypriory)&lt;br&gt;&lt;br&gt;2013-12-26:&lt;br&gt;* Forum: XSS at file rename (file manager) (@christypriory)&lt;br&gt;* Metashop: XSS in search function (@christypriory)&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:52:59 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7200663.html#7200663</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:52:59Z</dc:date>
    </item>
    <item>
      <title>Known/Disclosed Bugs</title>
      <link>http://forum.geizhals.at/t836538,7193339.html#7193339</link>
      <description>2013-12-13: &lt;br&gt;* Forum: XSS in 404-Google-search JS (@christypriory)&lt;br&gt;* Forum: XSS #2 (@christypriory)&lt;br&gt;* Forum: XSS #3 (-"-)&lt;br&gt;* Forum: XSS #4 (-"-)&lt;br&gt;* Forum: CSRF 1-4 (-"-)&lt;br&gt;* Forum: Clickjacking (-"-)&lt;br&gt;* Geizhals: XSS #1 (-"-)&lt;br&gt;* unternehmen.geizhals.at XSS #1 (-"-)&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:52:59 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7193339.html#7193339</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:52:59Z</dc:date>
    </item>
    <item>
      <title>Known/Disclosed Bugs</title>
      <link>http://forum.geizhals.at/t836538,7193271.html#7193271</link>
      <description>2013-12-13: &lt;br&gt;* Forum: XSS in 404-Google-search JS (@christypriory)&lt;br&gt;* Forum: XSS #2 (@christypriory)&lt;br&gt;* Forum: XSS #3 (-"-)&lt;br&gt;* Forum: XSS #4 (-"-)&lt;br&gt;* Forum: CSRF 1-4 (-"-)&lt;br&gt;* Forum: Clickjacking (-"-)&lt;br&gt;* Geizhals: XSS #1 (-"-)&lt;br&gt;&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:52:59 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7193271.html#7193271</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:52:59Z</dc:date>
    </item>
    <item>
      <title>Known/Disclosed Bugs</title>
      <link>http://forum.geizhals.at/t836538,7193268.html#7193268</link>
      <description>2013-12-13: &lt;br&gt;* Forum: XSS in 404-Google-search JS (@christypriory)&lt;br&gt;* Forum: XSS #2 (@christypriory)&lt;br&gt;* Forum: XSS #3 (-"-)&lt;br&gt;* Forum: CSRF 1-4 (-"-)&lt;br&gt;* Forum: Clickjacking (-"-)&lt;br&gt;* Geizhals: XSS #1 (-"-)&lt;br&gt;&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:52:59 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7193268.html#7193268</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:52:59Z</dc:date>
    </item>
    <item>
      <title>Known/Disclosed Bugs</title>
      <link>http://forum.geizhals.at/t836538,7192344.html#7192344</link>
      <description>TBD&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:52:59 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7192344.html#7192344</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:52:59Z</dc:date>
    </item>
    <item>
      <title>Known/Disclosed Bugs</title>
      <link>http://forum.geizhals.at/t836538,7193730.html#7193730</link>
      <description>2013-12-13: &lt;br&gt;* Forum: XSS in 404-Google-search JS (@christypriory)&lt;br&gt;* Forum: XSS #2 (@christypriory)&lt;br&gt;* Forum: XSS #3 (-"-)&lt;br&gt;* Forum: XSS #4 (-"-)&lt;br&gt;* Forum: CSRF 1-4 (-"-)&lt;br&gt;* Forum: Clickjacking (-"-)&lt;br&gt;* Geizhals: XSS #1 (-"-)&lt;br&gt;* unternehmen.geizhals.at XSS #1 (-"-)&lt;br&gt;* sensitive HTTP information disclosure #1 (-"-)&lt;br&gt;* gewinnspiel/cenowarka/konkurs XSS&amp;nbsp;&amp;nbsp;(-"-)&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:52:59 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7193730.html#7193730</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:52:59Z</dc:date>
    </item>
    <item>
      <title>Known/Disclosed Bugs</title>
      <link>http://forum.geizhals.at/t836538,7193743.html#7193743</link>
      <description>2013-12-13: &lt;br&gt;* Forum: XSS in 404-Google-search JS (@christypriory)&lt;br&gt;* Forum: XSS #2 (@christypriory)&lt;br&gt;* Forum: XSS #3 (-"-)&lt;br&gt;* Forum: XSS #4 (-"-)&lt;br&gt;* Forum: CSRF 1-4 (-"-)&lt;br&gt;* Forum: Clickjacking (-"-)&lt;br&gt;* Geizhals: XSS #1 (-"-)&lt;br&gt;* unternehmen.geizhals.at XSS #1 (-"-)&lt;br&gt;* sensitive HTTP information disclosure #1 (-"-)&lt;br&gt;* gewinnspiel/cenowarka/konkurs XSS&amp;nbsp;&amp;nbsp;(-"-)&lt;br&gt;* Forum: tomcat example servlets possible session manipulation (-"-)&lt;br&gt;* Forum: URL redirection (-"-)&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:52:59 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7193743.html#7193743</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:52:59Z</dc:date>
    </item>
    <item>
      <title>Known/Disclosed Bugs</title>
      <link>http://forum.geizhals.at/t836538,7195015.html#7195015</link>
      <description>2013-12-13: &lt;br&gt;* Forum: XSS in 404-Google-search JS (@christypriory)&lt;br&gt;* Forum: XSS #2 (@christypriory)&lt;br&gt;* Forum: XSS #3 (-"-)&lt;br&gt;* Forum: XSS #4 (-"-)&lt;br&gt;* Forum: CSRF 1-4 (-"-)&lt;br&gt;* Forum: Clickjacking (-"-)&lt;br&gt;* Geizhals: XSS #1 (-"-)&lt;br&gt;* unternehmen.geizhals.at XSS #1 (-"-)&lt;br&gt;* sensitive HTTP information disclosure #1 (-"-)&lt;br&gt;* gewinnspiel/cenowarka/konkurs XSS&amp;nbsp;&amp;nbsp;(-"-)&lt;br&gt;* Forum: tomcat example servlets possible session manipulation (-"-)&lt;br&gt;* Forum: URL redirection (-"-)&lt;br&gt;2013-12-15: &lt;br&gt;* Geizhals: CSRF Wishlist creation (was known, but still ...)&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:52:59 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7195015.html#7195015</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:52:59Z</dc:date>
    </item>
    <item>
      <title>Known/Disclosed Bugs</title>
      <link>http://forum.geizhals.at/t836538,7200662.html#7200662</link>
      <description>2013-12-13: &lt;br&gt;* Forum: XSS in 404-Google-search JS (@christypriory)&lt;br&gt;* Forum: XSS #2 (@christypriory)&lt;br&gt;* Forum: XSS #3 (-"-)&lt;br&gt;* Forum: XSS #4 (-"-)&lt;br&gt;* Forum: CSRF 1-4 (-"-)&lt;br&gt;* Forum: Clickjacking (-"-)&lt;br&gt;* Geizhals: XSS #1 (-"-)&lt;br&gt;* unternehmen.geizhals.at XSS #1 (-"-)&lt;br&gt;* sensitive HTTP information disclosure #1 (-"-)&lt;br&gt;* gewinnspiel/cenowarka/konkurs XSS&amp;nbsp;&amp;nbsp;(-"-)&lt;br&gt;* Forum: tomcat example servlets possible session manipulation (-"-)&lt;br&gt;* Forum: URL redirection (-"-)&lt;br&gt;&lt;br&gt;2013-12-15: &lt;br&gt;* Geizhals: CSRF Wishlist creation (was known, but still ...)&lt;br&gt;&lt;br&gt;2013-12-26:&lt;br&gt;* Forum: XSS at file rename (file manager)&lt;br&gt;* Metashop: XSS in search function&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:52:59 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7200662.html#7200662</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:52:59Z</dc:date>
    </item>
    <item>
      <title>Known/Disclosed Bugs</title>
      <link>http://forum.geizhals.at/t836538,7207983.html#7207983</link>
      <description>2013-12-13: &lt;br&gt;* Forum: XSS in 404-Google-search JS (@christypriory)&lt;br&gt;* Forum: XSS #2 (@christypriory)&lt;br&gt;* Forum: XSS #3 (-"-)&lt;br&gt;* Forum: XSS #4 (-"-)&lt;br&gt;* Forum: CSRF 1-4 (-"-)&lt;br&gt;* Forum: Clickjacking (-"-)&lt;br&gt;* Geizhals: XSS #1 (-"-)&lt;br&gt;* unternehmen.geizhals.at XSS #1 (-"-)&lt;br&gt;* sensitive HTTP information disclosure #1 (-"-)&lt;br&gt;* gewinnspiel/cenowarka/konkurs XSS&amp;nbsp;&amp;nbsp;(-"-)&lt;br&gt;* Forum: tomcat example servlets possible session manipulation (-"-)&lt;br&gt;* Forum: URL redirection (-"-)&lt;br&gt;&lt;br&gt;2013-12-15: &lt;br&gt;* Geizhals: CSRF Wishlist creation (was known, but still ...) (@christypriory)&lt;br&gt;&lt;br&gt;2013-12-26:&lt;br&gt;* Forum: XSS at file rename (file manager) (@christypriory)&lt;br&gt;* Metashop: XSS in search function (@christypriory)&lt;br&gt;* Metashop: stored XSS (-"-)&lt;br&gt;* Metashop: Clickjacking (-"-)&lt;br&gt;* Metashop: internal path disclosure (-"-)&lt;br&gt;&lt;br&gt;2013-12-27:&lt;br&gt;* bepixelung: verify any e-mail address (@christypriory)&lt;br&gt;* bepixelung: stored XSS "Meine Bilder" (-"-)&lt;br&gt;&lt;br&gt;2013-01-06:&lt;br&gt;* bepixelung: CSRF delete any image (-"-)&lt;br&gt;* bepixelung: CSRF e-mail address change (-"-)&lt;br&gt;* bepixelung: CSRF delete account (-"-)&lt;br&gt;* bepixelung: clickjacking (-"-)&lt;br&gt;* bepixelung: XSS filter (-"-)&lt;br&gt;* bepixelung: XSS artikel (-"-)&lt;br&gt;* Kleinanzeigen: XSS (-"-)&lt;br&gt;* forum: XSS (-"-)&lt;br&gt;* Kleinanzeigen: directory listings (*patrick star*)&lt;br&gt;* forum: XSS Richtlinien (-"-)&lt;br&gt;* forum: SVG-Files auf forum.geizhals.at statt geizhalsforum.666kb.at (-"-)&lt;br&gt;* Metashop: XSS Bemerkungen bei Bestellung (-"-)&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:52:59 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7207983.html#7207983</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:52:59Z</dc:date>
    </item>
    <item>
      <title>Known/Disclosed Bugs</title>
      <link>http://forum.geizhals.at/t836538,7207986.html#7207986</link>
      <description>2013-12-13: &lt;br&gt;* Forum: XSS in 404-Google-search JS (@christypriory)&lt;br&gt;* Forum: XSS #2 (@christypriory)&lt;br&gt;* Forum: XSS #3 (-"-)&lt;br&gt;* Forum: XSS #4 (-"-)&lt;br&gt;* Forum: CSRF 1-4 (-"-)&lt;br&gt;* Forum: Clickjacking (-"-)&lt;br&gt;* Geizhals: XSS #1 (-"-)&lt;br&gt;* unternehmen.geizhals.at XSS #1 (-"-)&lt;br&gt;* sensitive HTTP information disclosure #1 (-"-)&lt;br&gt;* gewinnspiel/cenowarka/konkurs XSS&amp;nbsp;&amp;nbsp;(-"-)&lt;br&gt;* Forum: tomcat example servlets possible session manipulation (-"-)&lt;br&gt;* Forum: URL redirection (-"-)&lt;br&gt;&lt;br&gt;2013-12-15: &lt;br&gt;* Geizhals: CSRF Wishlist creation (was known, but still ...) (@christypriory)&lt;br&gt;&lt;br&gt;2013-12-26:&lt;br&gt;* Forum: XSS at file rename (file manager) (@christypriory)&lt;br&gt;* Metashop: XSS in search function (@christypriory)&lt;br&gt;* Metashop: stored XSS (-"-)&lt;br&gt;* Metashop: Clickjacking (-"-)&lt;br&gt;* Metashop: internal path disclosure (-"-)&lt;br&gt;&lt;br&gt;2013-12-27:&lt;br&gt;* bepixelung: verify any e-mail address (@christypriory)&lt;br&gt;* bepixelung: stored XSS "Meine Bilder" (-"-)&lt;br&gt;&lt;br&gt;2013-01-06:&lt;br&gt;* bepixelung: CSRF delete any image (-"-)&lt;br&gt;* bepixelung: CSRF e-mail address change (-"-)&lt;br&gt;* bepixelung: CSRF delete account (-"-)&lt;br&gt;* bepixelung: clickjacking (-"-)&lt;br&gt;* bepixelung: XSS filter (-"-)&lt;br&gt;* bepixelung: XSS artikel (-"-)&lt;br&gt;* Kleinanzeigen: XSS (-"-)&lt;br&gt;* forum: XSS (-"-)&lt;br&gt;* Kleinanzeigen: directory listings (*patrick star*)&lt;br&gt;* forum: XSS Richtlinien (-"-)&lt;br&gt;* forum: SVG-Files auf forum.geizhals.at statt geizhalsforum.666kb.at (-"-)&lt;br&gt;* Metashop: XSS Bemerkungen bei Bestellung (-"-)&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;hr/&gt;&lt;br&gt;&lt;b&gt;2014-01-08: 36 issues acknowledged; 32 bounties paid.&lt;/b&gt;&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:52:59 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7207986.html#7207986</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:52:59Z</dc:date>
    </item>
    <item>
      <title>Known/Disclosed Bugs</title>
      <link>http://forum.geizhals.at/t836538,7207987.html#7207987</link>
      <description>2013-12-13: &lt;br&gt;* Forum: XSS in 404-Google-search JS (@christypriory)&lt;br&gt;* Forum: XSS #2 (@christypriory)&lt;br&gt;* Forum: XSS #3 (-"-)&lt;br&gt;* Forum: XSS #4 (-"-)&lt;br&gt;* Forum: CSRF 1-4 (-"-)&lt;br&gt;* Forum: Clickjacking (-"-)&lt;br&gt;* Geizhals: XSS #1 (-"-)&lt;br&gt;* unternehmen.geizhals.at XSS #1 (-"-)&lt;br&gt;* sensitive HTTP information disclosure #1 (-"-)&lt;br&gt;* gewinnspiel/cenowarka/konkurs XSS&amp;nbsp;&amp;nbsp;(-"-)&lt;br&gt;* Forum: tomcat example servlets possible session manipulation (-"-)&lt;br&gt;* Forum: URL redirection (-"-)&lt;br&gt;&lt;br&gt;2013-12-15: &lt;br&gt;* Geizhals: CSRF Wishlist creation (was known, but still ...) (@christypriory)&lt;br&gt;&lt;br&gt;2013-12-26:&lt;br&gt;* Forum: XSS at file rename (file manager) (@christypriory)&lt;br&gt;* Metashop: XSS in search function (@christypriory)&lt;br&gt;* Metashop: stored XSS (-"-)&lt;br&gt;* Metashop: Clickjacking (-"-)&lt;br&gt;* Metashop: internal path disclosure (-"-)&lt;br&gt;&lt;br&gt;2013-12-27:&lt;br&gt;* bepixelung: verify any e-mail address (@christypriory)&lt;br&gt;* bepixelung: stored XSS "Meine Bilder" (-"-)&lt;br&gt;&lt;br&gt;2013-01-06:&lt;br&gt;* bepixelung: CSRF delete any image (-"-)&lt;br&gt;* bepixelung: CSRF e-mail address change (-"-)&lt;br&gt;* bepixelung: CSRF delete account (-"-)&lt;br&gt;* bepixelung: clickjacking (-"-)&lt;br&gt;* bepixelung: XSS filter (-"-)&lt;br&gt;* bepixelung: XSS artikel (-"-)&lt;br&gt;* Kleinanzeigen: XSS (-"-)&lt;br&gt;* forum: XSS (-"-)&lt;br&gt;* Kleinanzeigen: directory listings (*patrick star*)&lt;br&gt;* forum: XSS Richtlinien (-"-)&lt;br&gt;* forum: SVG-Files auf forum.geizhals.at statt geizhalsforum.666kb.at (-"-)&lt;br&gt;* Metashop: XSS Bemerkungen bei Bestellung (-"-)&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;hr/&gt;&lt;br&gt;&lt;b&gt;2014-01-08: 37 issues acknowledged; 32 bounties paid.&lt;/b&gt;&lt;br&gt;&lt;br&gt;&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:52:59 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7207987.html#7207987</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:52:59Z</dc:date>
    </item>
    <item>
      <title>Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7259451.html#7259451</link>
      <description>&lt;blockquote&gt;&lt;br&gt;&lt;br&gt;Geizhals Bug Bounty Program&lt;br&gt;===========================================&lt;br&gt;DRAFT, valid from 21.12.2013 as published at that date.&lt;br&gt;&lt;br&gt;&lt;br&gt;General terms:&lt;br&gt;&lt;br&gt;&lt;ul&gt;&lt;br&gt;&lt;li/&gt; applies to websites using the domains: geizhals.at, geizhals.de, geizhals.eu, compare.eu, skinflint.co.uk, cenowarka.pl, bepixelung.org, metashop.at&lt;br&gt;&lt;li/&gt;in some cases, multiple reports for seemingly different websites might refer to the exact same problem / piece of code, because e.g. skinflint.co.uk uses the same code as geizhals.at etc. - here we will consider these multiple reports as one at our discretion. Specifically, this is true for Forum HTML filtering in multiple places (guestbook, posts, signature ...)&lt;br&gt;&lt;li/&gt;we may offer to pay bounties in the form of Amazon vouchers (we will let you choose from Amazon.de, Amazon.co.uk and possibly others if we can pay them without tax issues)&lt;br&gt;&lt;li/&gt;we will publish information about submissions with as much detail as we choose to&lt;br&gt;&lt;li/&gt;first come, first serve - bounties are paid to first submitter only and only once per type of vulnerability (not for different ways of exploiting the same or for each account compromised etc.)&lt;br&gt;&lt;li/&gt;damages caused unnecessarily will be subtracted from bounties (we'll be fair). If too much avoidable damage was caused, we may refuse to pay bounties (please don't do it, this bug bounty program does not exist in order to invite people to cause damage to us)&lt;br&gt;&lt;li/&gt;known vulnerabilities we are trying to fix and published by us already, are excluded&lt;br&gt;&lt;li/&gt;if multiple cases below apply, the highest is paid, except for vulnerable 3rd party code (i.e. Debian packages), where we pay only the bounty for that category (the best matching)&lt;br&gt;&lt;li/&gt;all submissions must be sent to bugbounty@geizhals.at and readable with MUAs without HTML support&lt;br&gt;&lt;li/&gt;exploit details must not be published elsewhere before we've had reasonable time to fix the problem&lt;br&gt;&lt;li/&gt;we may update the terms / bounties however we wish at any time without prior notice, however for submitted bugs sent before new terms are announced, the old terms will apply&lt;br&gt;&lt;li/&gt;we must be able to reproduce reported bugs without an unusual/exotic platform/configuration&lt;br&gt;&lt;li/&gt;we will try to be as fair and objective as possible, however if we cannot afford some bounties or&amp;nbsp;&amp;nbsp;if we made stupid mistakes in the terms published that allow exploitation in an unintended way, we&amp;nbsp;&amp;nbsp;reserve the right to refuse bounties. Please be fair and reasonable too!&lt;br&gt;&lt;/ul&gt;&lt;br&gt;&lt;br&gt;SEVERITY&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; BOUNTY&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;EXTRA TERMS&lt;br&gt;-------------------------------------------------------------------------&lt;br&gt;XSS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€100&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br&gt;&lt;br&gt;CSRF&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; €100&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; if user data can be manipulated through 3rd party websites&lt;br&gt;&lt;br&gt;SQL Injection&amp;nbsp;&amp;nbsp; €200&lt;br&gt;&lt;br&gt;Capturing a user&lt;br&gt;account&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€150&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Brute-forcing, phishing or MITM are not applicable. Using XSS: &lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XSS bounty above will apply.&lt;br&gt;&lt;br&gt;Severe DoS&lt;br&gt;opportunity&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€200&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;When a particular request/URL causes effective DoS with &lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 hit per 60 seconds (yes we know about forum search and&lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; best merchant combination calculations, they are slow...)&lt;br&gt;&lt;br&gt;Remote code&lt;br&gt;execution/login&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€500&lt;br&gt;&lt;br&gt;Remote code exec.&lt;br&gt;as root&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€1000&lt;br&gt;&lt;br&gt;Any of the above &lt;br&gt;when caused by 3rd&lt;br&gt;party bug with fix&lt;br&gt;available for 48h&lt;br&gt;or longer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€200&lt;br&gt;&lt;br&gt;Any of the above &lt;br&gt;when caused by 3rd&lt;br&gt;party bug with fix&lt;br&gt;available for &amp;lt;48h €0 (because we'll hopefully fix it automatically)&lt;br&gt;&lt;br&gt;Any of the above&lt;br&gt;when caused by 3rd&lt;br&gt;party bug with NO&lt;br&gt;fix available yet&amp;nbsp;&amp;nbsp;CONTACT DEBIAN/appropriate authorities urgently!&lt;br&gt;&lt;br&gt;&lt;/blockquote&gt;&lt;br&gt;&lt;br&gt;&lt;hr/&gt;&lt;br&gt;2013-12-19: increased bounties&lt;br&gt;2013-12-26: added bepixelung.org, metashop.at&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:34:48 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7259451.html#7259451</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:34:48Z</dc:date>
    </item>
    <item>
      <title>Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7259450.html#7259450</link>
      <description>&lt;blockquote&gt;&lt;br&gt;&lt;br&gt;Geizhals Bug Bounty Program&lt;br&gt;===========================================&lt;br&gt;DRAFT, valid from 21.12.2013 as published at that date.&lt;br&gt;&lt;br&gt;&lt;br&gt;General terms:&lt;br&gt;&lt;br&gt;&lt;ul&gt;&lt;br&gt;&lt;li/&gt; applies to websites using the domains: geizhals.at, geizhals.de, geizhals.eu, compare.eu, skinflint.co.uk, cenowarka.pl, bepixelung.org, metashop.at&lt;br&gt;&lt;li/&gt;in some cases, multiple reports for seemingly different websites might refer to the exact same problem / piece of code, because e.g. skinflint.co.uk uses the same code as geizhals.at etc. - here we will consider these multiple reports as one at our discretion. Specifically, this is true for Forum HTML filtering.&lt;br&gt;&lt;li/&gt;we may offer to pay bounties in the form of Amazon vouchers (we will let you choose from Amazon.de, Amazon.co.uk and possibly others if we can pay them without tax issues)&lt;br&gt;&lt;li/&gt;we will publish information about submissions with as much detail as we choose to&lt;br&gt;&lt;li/&gt;first come, first serve - bounties are paid to first submitter only and only once per type of vulnerability (not for different ways of exploiting the same or for each account compromised etc.)&lt;br&gt;&lt;li/&gt;damages caused unnecessarily will be subtracted from bounties (we'll be fair). If too much avoidable damage was caused, we may refuse to pay bounties (please don't do it, this bug bounty program does not exist in order to invite people to cause damage to us)&lt;br&gt;&lt;li/&gt;known vulnerabilities we are trying to fix and published by us already, are excluded&lt;br&gt;&lt;li/&gt;if multiple cases below apply, the highest is paid, except for vulnerable 3rd party code (i.e. Debian packages), where we pay only the bounty for that category (the best matching)&lt;br&gt;&lt;li/&gt;all submissions must be sent to bugbounty@geizhals.at and readable with MUAs without HTML support&lt;br&gt;&lt;li/&gt;exploit details must not be published elsewhere before we've had reasonable time to fix the problem&lt;br&gt;&lt;li/&gt;we may update the terms / bounties however we wish at any time without prior notice, however for submitted bugs sent before new terms are announced, the old terms will apply&lt;br&gt;&lt;li/&gt;we must be able to reproduce reported bugs without an unusual/exotic platform/configuration&lt;br&gt;&lt;li/&gt;we will try to be as fair and objective as possible, however if we cannot afford some bounties or&amp;nbsp;&amp;nbsp;if we made stupid mistakes in the terms published that allow exploitation in an unintended way, we&amp;nbsp;&amp;nbsp;reserve the right to refuse bounties. Please be fair and reasonable too!&lt;br&gt;&lt;/ul&gt;&lt;br&gt;&lt;br&gt;SEVERITY&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; BOUNTY&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;EXTRA TERMS&lt;br&gt;-------------------------------------------------------------------------&lt;br&gt;XSS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€100&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br&gt;&lt;br&gt;CSRF&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; €100&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; if user data can be manipulated through 3rd party websites&lt;br&gt;&lt;br&gt;SQL Injection&amp;nbsp;&amp;nbsp; €200&lt;br&gt;&lt;br&gt;Capturing a user&lt;br&gt;account&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€150&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Brute-forcing, phishing or MITM are not applicable. Using XSS: &lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XSS bounty above will apply.&lt;br&gt;&lt;br&gt;Severe DoS&lt;br&gt;opportunity&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€200&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;When a particular request/URL causes effective DoS with &lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 hit per 60 seconds (yes we know about forum search and&lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; best merchant combination calculations, they are slow...)&lt;br&gt;&lt;br&gt;Remote code&lt;br&gt;execution/login&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€500&lt;br&gt;&lt;br&gt;Remote code exec.&lt;br&gt;as root&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€1000&lt;br&gt;&lt;br&gt;Any of the above &lt;br&gt;when caused by 3rd&lt;br&gt;party bug with fix&lt;br&gt;available for 48h&lt;br&gt;or longer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€200&lt;br&gt;&lt;br&gt;Any of the above &lt;br&gt;when caused by 3rd&lt;br&gt;party bug with fix&lt;br&gt;available for &amp;lt;48h €0 (because we'll hopefully fix it automatically)&lt;br&gt;&lt;br&gt;Any of the above&lt;br&gt;when caused by 3rd&lt;br&gt;party bug with NO&lt;br&gt;fix available yet&amp;nbsp;&amp;nbsp;CONTACT DEBIAN/appropriate authorities urgently!&lt;br&gt;&lt;br&gt;&lt;/blockquote&gt;&lt;br&gt;&lt;br&gt;&lt;hr/&gt;&lt;br&gt;2013-12-19: increased bounties&lt;br&gt;2013-12-26: added bepixelung.org, metashop.at&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:34:48 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7259450.html#7259450</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:34:48Z</dc:date>
    </item>
    <item>
      <title>Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7200644.html#7200644</link>
      <description>&lt;blockquote&gt;&lt;br&gt;&lt;br&gt;Geizhals Bug Bounty Program&lt;br&gt;===========================================&lt;br&gt;DRAFT, valid from 21.12.2013 as published at that date.&lt;br&gt;&lt;br&gt;&lt;br&gt;General terms:&lt;br&gt;&lt;br&gt;&lt;ul&gt;&lt;br&gt;&lt;li/&gt; applies to websites using the domains: geizhals.at, geizhals.de, geizhals.eu, compare.eu, skinflint.co.uk, cenowarka.pl, bepixelung.org, metashop.at&lt;br&gt;&lt;li/&gt;in some cases, multiple reports for seemingly different websites might refer to the exact same problem / piece of code, because e.g. skinflint.co.uk uses the same code as geizhals.at etc. - here we will consider these multiple reports as one at our discretion.&lt;br&gt;&lt;li/&gt;we may offer to pay bounties in the form of Amazon vouchers (we will let you choose from Amazon.de, Amazon.co.uk and possibly others if we can pay them without tax issues)&lt;br&gt;&lt;li/&gt;we will publish information about submissions with as much detail as we choose to&lt;br&gt;&lt;li/&gt;first come, first serve - bounties are paid to first submitter only and only once per type of vulnerability (not for different ways of exploiting the same or for each account compromised etc.)&lt;br&gt;&lt;li/&gt;damages caused unnecessarily will be subtracted from bounties (we'll be fair). If too much avoidable damage was caused, we may refuse to pay bounties (please don't do it, this bug bounty program does not exist in order to invite people to cause damage to us)&lt;br&gt;&lt;li/&gt;known vulnerabilities we are trying to fix and published by us already, are excluded&lt;br&gt;&lt;li/&gt;if multiple cases below apply, the highest is paid, except for vulnerable 3rd party code (i.e. Debian packages), where we pay only the bounty for that category (the best matching)&lt;br&gt;&lt;li/&gt;all submissions must be sent to bugbounty@geizhals.at and readable with MUAs without HTML support&lt;br&gt;&lt;li/&gt;exploit details must not be published elsewhere before we've had reasonable time to fix the problem&lt;br&gt;&lt;li/&gt;we may update the terms / bounties however we wish at any time without prior notice, however for submitted bugs sent before new terms are announced, the old terms will apply&lt;br&gt;&lt;li/&gt;we must be able to reproduce reported bugs without an unusual/exotic platform/configuration&lt;br&gt;&lt;li/&gt;we will try to be as fair and objective as possible, however if we cannot afford some bounties or&amp;nbsp;&amp;nbsp;if we made stupid mistakes in the terms published that allow exploitation in an unintended way, we&amp;nbsp;&amp;nbsp;reserve the right to refuse bounties. Please be fair and reasonable too!&lt;br&gt;&lt;/ul&gt;&lt;br&gt;&lt;br&gt;SEVERITY&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; BOUNTY&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;EXTRA TERMS&lt;br&gt;-------------------------------------------------------------------------&lt;br&gt;XSS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€100&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br&gt;&lt;br&gt;CSRF&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; €100&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; if user data can be manipulated through 3rd party websites&lt;br&gt;&lt;br&gt;SQL Injection&amp;nbsp;&amp;nbsp; €200&lt;br&gt;&lt;br&gt;Capturing a user&lt;br&gt;account&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€150&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Brute-forcing, phishing or MITM are not applicable. Using XSS: &lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XSS bounty above will apply.&lt;br&gt;&lt;br&gt;Severe DoS&lt;br&gt;opportunity&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€200&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;When a particular request/URL causes effective DoS with &lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 hit per 60 seconds (yes we know about forum search and&lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; best merchant combination calculations, they are slow...)&lt;br&gt;&lt;br&gt;Remote code&lt;br&gt;execution/login&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€500&lt;br&gt;&lt;br&gt;Remote code exec.&lt;br&gt;as root&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€1000&lt;br&gt;&lt;br&gt;Any of the above &lt;br&gt;when caused by 3rd&lt;br&gt;party bug with fix&lt;br&gt;available for 48h&lt;br&gt;or longer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€200&lt;br&gt;&lt;br&gt;Any of the above &lt;br&gt;when caused by 3rd&lt;br&gt;party bug with fix&lt;br&gt;available for &amp;lt;48h €0 (because we'll hopefully fix it automatically)&lt;br&gt;&lt;br&gt;Any of the above&lt;br&gt;when caused by 3rd&lt;br&gt;party bug with NO&lt;br&gt;fix available yet&amp;nbsp;&amp;nbsp;CONTACT DEBIAN/appropriate authorities urgently!&lt;br&gt;&lt;br&gt;&lt;/blockquote&gt;&lt;br&gt;&lt;br&gt;&lt;hr/&gt;&lt;br&gt;2013-12-19: increased bounties&lt;br&gt;2013-12-26: added bepixelung.org, metashop.at&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:34:48 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7200644.html#7200644</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:34:48Z</dc:date>
    </item>
    <item>
      <title>Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7196898.html#7196898</link>
      <description>&lt;blockquote&gt;&lt;br&gt;&lt;br&gt;Geizhals Bug Bounty Program&lt;br&gt;===========================================&lt;br&gt;DRAFT, valid from 21.12.2013 as published at that date.&lt;br&gt;&lt;br&gt;&lt;br&gt;General terms:&lt;br&gt;&lt;br&gt;&lt;ul&gt;&lt;br&gt;&lt;li/&gt; applies to websites using the domains: geizhals.at, geizhals.de, geizhals.eu, compare.eu, skinflint.co.uk, cenowarka.pl&lt;br&gt;&lt;li/&gt;in some cases, multiple reports for seemingly different websites might refer to the exact same problem / piece of code, because e.g. skinflint.co.uk uses the same code as geizhals.at etc. - here we will consider these multiple reports as one at our discretion.&lt;br&gt;&lt;li/&gt;we may offer to pay bounties in the form of Amazon vouchers (we will let you choose from Amazon.de, Amazon.co.uk and possibly others if we can pay them without tax issues)&lt;br&gt;&lt;li/&gt;we will publish information about submissions with as much detail as we choose to&lt;br&gt;&lt;li/&gt;first come, first serve - bounties are paid to first submitter only and only once per type of vulnerability (not for different ways of exploiting the same or for each account compromised etc.)&lt;br&gt;&lt;li/&gt;damages caused unnecessarily will be subtracted from bounties (we'll be fair). If too much avoidable damage was caused, we may refuse to pay bounties (please don't do it, this bug bounty program does not exist in order to invite people to cause damage to us)&lt;br&gt;&lt;li/&gt;known vulnerabilities we are trying to fix and published by us already, are excluded&lt;br&gt;&lt;li/&gt;if multiple cases below apply, the highest is paid, except for vulnerable 3rd party code (i.e. Debian packages), where we pay only the bounty for that category (the best matching)&lt;br&gt;&lt;li/&gt;all submissions must be sent to bugbounty@geizhals.at and readable with MUAs without HTML support&lt;br&gt;&lt;li/&gt;exploit details must not be published elsewhere before we've had reasonable time to fix the problem&lt;br&gt;&lt;li/&gt;we may update the terms / bounties however we wish at any time without prior notice, however for submitted bugs sent before new terms are announced, the old terms will apply&lt;br&gt;&lt;li/&gt;we must be able to reproduce reported bugs without an unusual/exotic platform/configuration&lt;br&gt;&lt;li/&gt;we will try to be as fair and objective as possible, however if we cannot afford some bounties or&amp;nbsp;&amp;nbsp;if we made stupid mistakes in the terms published that allow exploitation in an unintended way, we&amp;nbsp;&amp;nbsp;reserve the right to refuse bounties. Please be fair and reasonable too!&lt;br&gt;&lt;/ul&gt;&lt;br&gt;&lt;br&gt;SEVERITY&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; BOUNTY&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;EXTRA TERMS&lt;br&gt;-------------------------------------------------------------------------&lt;br&gt;XSS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€100&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br&gt;&lt;br&gt;CSRF&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; €100&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; if user data can be manipulated through 3rd party websites&lt;br&gt;&lt;br&gt;SQL Injection&amp;nbsp;&amp;nbsp; €200&lt;br&gt;&lt;br&gt;Capturing a user&lt;br&gt;account&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€150&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Brute-forcing, phishing or MITM are not applicable. Using XSS: &lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XSS bounty above will apply.&lt;br&gt;&lt;br&gt;Severe DoS&lt;br&gt;opportunity&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€200&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;When a particular request/URL causes effective DoS with &lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 hit per 60 seconds (yes we know about forum search and&lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; best merchant combination calculations, they are slow...)&lt;br&gt;&lt;br&gt;Remote code&lt;br&gt;execution/login&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€500&lt;br&gt;&lt;br&gt;Remote code exec.&lt;br&gt;as root&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€1000&lt;br&gt;&lt;br&gt;Any of the above &lt;br&gt;when caused by 3rd&lt;br&gt;party bug with fix&lt;br&gt;available for 48h&lt;br&gt;or longer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€200&lt;br&gt;&lt;br&gt;Any of the above &lt;br&gt;when caused by 3rd&lt;br&gt;party bug with fix&lt;br&gt;available for &amp;lt;48h €0 (because we'll hopefully fix it automatically)&lt;br&gt;&lt;br&gt;Any of the above&lt;br&gt;when caused by 3rd&lt;br&gt;party bug with NO&lt;br&gt;fix available yet&amp;nbsp;&amp;nbsp;CONTACT DEBIAN/appropriate authorities urgently!&lt;br&gt;&lt;br&gt;&lt;/blockquote&gt;&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:34:48 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7196898.html#7196898</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:34:48Z</dc:date>
    </item>
    <item>
      <title>Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7387622.html#7387622</link>
      <description>&lt;blockquote&gt;&lt;br&gt;&lt;br&gt;Geizhals Bug Bounty Program&lt;br&gt;===========================================&lt;br&gt;DRAFT, valid from 27.11.2014 as published at that date.&lt;br&gt;&lt;br&gt;&lt;br&gt;General terms:&lt;br&gt;&lt;br&gt;&lt;ul&gt;&lt;br&gt;&lt;li/&gt; applies to websites explicitly and directly using the domains: geizhals.at, geizhals.de, geizhals.eu, compare.eu, skinflint.co.uk, cenowarka.pl, bepixelung.org, metashop.at&lt;br&gt;&lt;li/&gt;in some cases, multiple reports for seemingly different websites might refer to the exact same problem / piece of code, because e.g. skinflint.co.uk uses the same code as geizhals.at etc. - here we will consider these multiple reports as one at our discretion. Specifically, this is true for Forum HTML filtering in multiple places (guestbook, posts, signature ...)&lt;br&gt;&lt;li/&gt;we may offer to pay bounties in the form of Amazon vouchers (we will let you choose from Amazon.de, Amazon.co.uk and possibly others if we can pay them without tax issues)&lt;br&gt;&lt;li/&gt;we will publish information about submissions with as much detail as we choose to&lt;br&gt;&lt;li/&gt;first come, first serve - bounties are paid to first submitter only and only once per type of vulnerability (not for different ways of exploiting the same or for each account compromised etc.)&lt;br&gt;&lt;li/&gt;damages caused unnecessarily will be subtracted from bounties (we'll be fair). If too much avoidable damage was caused, we may refuse to pay bounties (please don't do it, this bug bounty program does not exist in order to invite people to cause damage to us)&lt;br&gt;&lt;li/&gt;known vulnerabilities we are trying to fix and published by us already, are excluded&lt;br&gt;&lt;li/&gt;if multiple cases below apply, the highest is paid, except for vulnerable 3rd party code (i.e. Debian packages), where we pay only the bounty for that category (the best matching)&lt;br&gt;&lt;li/&gt;all submissions must be sent to bugbounty@geizhals.at and readable with MUAs without HTML support&lt;br&gt;&lt;li/&gt;exploit details must not be published elsewhere before we've had reasonable time to fix the problem&lt;br&gt;&lt;li/&gt;we may update the terms / bounties however we wish at any time without prior notice, however for submitted bugs sent before new terms are announced, the old terms will apply&lt;br&gt;&lt;li/&gt;we must be able to reproduce reported bugs without an unusual/exotic platform/configuration&lt;br&gt;&lt;li/&gt;we will try to be as fair and objective as possible, however if we cannot afford some bounties or&amp;nbsp;&amp;nbsp;if we made stupid mistakes in the terms published that allow exploitation in an unintended way, we&amp;nbsp;&amp;nbsp;reserve the right to refuse bounties. Please be fair and reasonable too!&lt;br&gt;&lt;/ul&gt;&lt;br&gt;&lt;br&gt;SEVERITY&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; BOUNTY&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;EXTRA TERMS&lt;br&gt;-------------------------------------------------------------------------&lt;br&gt;XSS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€100&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br&gt;&lt;br&gt;CSRF&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; €100&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; if user data can be manipulated through 3rd party websites&lt;br&gt;&lt;br&gt;SQL Injection&amp;nbsp;&amp;nbsp; €200&lt;br&gt;&lt;br&gt;Capturing a user&lt;br&gt;account&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€150&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Brute-forcing, phishing or MITM are not applicable. Using XSS: &lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XSS bounty above will apply.&lt;br&gt;&lt;br&gt;Severe DoS&lt;br&gt;opportunity&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€200&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;When a particular request/URL causes effective DoS with &lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 hit per 60 seconds (yes we know about forum search and&lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; best merchant combination calculations, they are slow...)&lt;br&gt;&lt;br&gt;Remote code&lt;br&gt;execution/login&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€500&lt;br&gt;&lt;br&gt;Remote code exec.&lt;br&gt;as root&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€1000&lt;br&gt;&lt;br&gt;Any of the above &lt;br&gt;when caused by 3rd&lt;br&gt;party bug with fix&lt;br&gt;available for 48h&lt;br&gt;or longer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€200&lt;br&gt;&lt;br&gt;Any of the above &lt;br&gt;when caused by 3rd&lt;br&gt;party bug with fix&lt;br&gt;available for &amp;lt;48h €0 (because we'll hopefully fix it automatically)&lt;br&gt;&lt;br&gt;Any of the above&lt;br&gt;when caused by 3rd&lt;br&gt;party bug with NO&lt;br&gt;fix available yet&amp;nbsp;&amp;nbsp;CONTACT DEBIAN/appropriate authorities urgently!&lt;br&gt;&lt;br&gt;&lt;/blockquote&gt;&lt;br&gt;&lt;br&gt;&lt;hr/&gt;&lt;br&gt;2013-12-19: increased bounties&lt;br&gt;2013-12-26: added bepixelung.org, metashop.at&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:34:48 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7387622.html#7387622</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:34:48Z</dc:date>
    </item>
    <item>
      <title>Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7193729.html#7193729</link>
      <description>&lt;blockquote&gt;&lt;br&gt;&lt;br&gt;Geizhals Bug Bounty Program&lt;br&gt;===========================================&lt;br&gt;DRAFT, valid from 21.12.2013 as published at that date.&lt;br&gt;&lt;br&gt;&lt;br&gt;General terms:&lt;br&gt;&lt;br&gt;&lt;ul&gt;&lt;br&gt;&lt;li/&gt; applies to websites using the domains: geizhals.at, geizhals.de, geizhals.eu, compare.eu, skinflint.co.uk, cenowarka.pl&lt;br&gt;&lt;li/&gt;in some cases, multiple reports for seemingly different websites might refer to the exact same problem / piece of code, because e.g. skinflint.co.uk uses the same code as geizhals.at etc. - here we will consider these multiple reports as one at our discretion.&lt;br&gt;&lt;li/&gt;we may offer to pay bounties in the form of Amazon vouchers (we will let you choose from Amazon.de, Amazon.co.uk and possibly others if we can pay them without tax issues)&lt;br&gt;&lt;li/&gt;we will publish information about submissions with as much detail as we choose to&lt;br&gt;&lt;li/&gt;first come, first serve - bounties are paid to first submitter only and only once per type of vulnerability (not for different ways of exploiting the same or for each account compromised etc.)&lt;br&gt;&lt;li/&gt;damages caused unnecessarily will be subtracted from bounties (we'll be fair). If too much avoidable damage was caused, we may refuse to pay bounties (please don't do it, this bug bounty program does not exist in order to invite people to cause damage to us)&lt;br&gt;&lt;li/&gt;known vulnerabilities we are trying to fix and published by us already, are excluded&lt;br&gt;&lt;li/&gt;if multiple cases below apply, the highest is paid, except for vulnerable 3rd party code (i.e. Debian packages), where we pay only the bounty for that category (the best matching)&lt;br&gt;&lt;li/&gt;all submissions must be sent to bugbounty@geizhals.at and readable with MUAs without HTML support&lt;br&gt;&lt;li/&gt;exploit details must not be published elsewhere before we've had reasonable time to fix the problem&lt;br&gt;&lt;li/&gt;we may update the terms / bounties however we wish at any time without prior notice, however for submitted bugs sent before new terms are announced, the old terms will apply&lt;br&gt;&lt;li/&gt;we must be able to reproduce reported bugs without an unusual/exotic platform/configuration&lt;br&gt;&lt;li/&gt;we will try to be as fair and objective as possible, however if we cannot afford some bounties or&amp;nbsp;&amp;nbsp;if we made stupid mistakes in the terms published that allow exploitation in an unintended way, we&amp;nbsp;&amp;nbsp;reserve the right to refuse bounties. Please be fair and reasonable too!&lt;br&gt;&lt;/ul&gt;&lt;br&gt;&lt;br&gt;SEVERITY&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; BOUNTY&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;EXTRA TERMS&lt;br&gt;-------------------------------------------------------------------------&lt;br&gt;XSS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€50&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br&gt;&lt;br&gt;CSRF&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; €50&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; if user data can be manipulated through 3rd party websites&lt;br&gt;&lt;br&gt;SQL Injection&amp;nbsp;&amp;nbsp; €100&lt;br&gt;&lt;br&gt;Capturing a user&lt;br&gt;account&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€150&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Brute-forcing, phishing or MITM are not applicable. Using XSS: &lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XSS bounty above will apply.&lt;br&gt;&lt;br&gt;Severe DoS&lt;br&gt;opportunity&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€100&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;When a particular request/URL causes effective DoS with &lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 hit per 60 seconds (yes we know about forum search and&lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; best merchant combination calculations, they are slow...)&lt;br&gt;&lt;br&gt;Remote code&lt;br&gt;execution/login&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€300&lt;br&gt;&lt;br&gt;Remote code exec.&lt;br&gt;as root&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€1000&lt;br&gt;&lt;br&gt;Any of the above &lt;br&gt;when caused by 3rd&lt;br&gt;party bug with fix&lt;br&gt;available for 48h&lt;br&gt;or longer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€200&lt;br&gt;&lt;br&gt;Any of the above &lt;br&gt;when caused by 3rd&lt;br&gt;party bug with fix&lt;br&gt;available for &amp;lt;48h €0 (because we'll hopefully fix it automatically)&lt;br&gt;&lt;br&gt;Any of the above&lt;br&gt;when caused by 3rd&lt;br&gt;party bug with NO&lt;br&gt;fix available yet&amp;nbsp;&amp;nbsp;CONTACT DEBIAN/appropriate authorities urgently!&lt;br&gt;&lt;br&gt;&lt;/blockquote&gt;&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:34:48 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7193729.html#7193729</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:34:48Z</dc:date>
    </item>
    <item>
      <title>Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7192343.html#7192343</link>
      <description>&lt;blockquote&gt;&lt;br&gt;&lt;br&gt;Geizhals Bug Bounty Program&lt;br&gt;===========================================&lt;br&gt;DRAFT, valid from 21.12.2013 as published at that date.&lt;br&gt;&lt;br&gt;&lt;br&gt;General terms:&lt;br&gt;&lt;br&gt;&lt;ul&gt;&lt;br&gt;&lt;li/&gt; applies to websites using the domains: geizhals.at, geizhals.de, geizhals.eu, compare.eu, skinflint.co.uk, cenowarka.pl&lt;br&gt;&lt;li/&gt;we may offer to pay bounties in the form of Amazon vouchers (we will let you choose from Amazon.de, Amazon.co.uk and possibly others if we can pay them without tax issues)&lt;br&gt;&lt;li/&gt;we will publish information about submissions with as much detail as we choose to&lt;br&gt;&lt;li/&gt;first come, first serve - bounties are paid to first submitter only and only once per type of vulnerability (not for different ways of exploiting the same or for each account compromised etc.)&lt;br&gt;&lt;li/&gt;damages caused unnecessarily will be subtracted from bounties (we'll be fair). If too much avoidable damage was caused, we may refuse to pay bounties (please don't do it, this bug bounty program does not exist in order to invite people to cause damage to us)&lt;br&gt;&lt;li/&gt;known vulnerabilities we are trying to fix and published by us already, are excluded&lt;br&gt;&lt;li/&gt;if multiple cases below apply, the highest is paid, except for vulnerable 3rd party code (i.e. Debian packages), where we pay only the bounty for that category (the best matching)&lt;br&gt;&lt;li/&gt;all submissions must be sent to bugbounty@geizhals.at and readable with MUAs without HTML support&lt;br&gt;&lt;li/&gt;exploit details must not be published elsewhere before we've had reasonable time to fix the problem&lt;br&gt;&lt;li/&gt;we may update the terms / bounties however we wish at any time without prior notice, however for submitted bugs sent before new terms are announced, the old terms will apply&lt;br&gt;&lt;li/&gt;we must be able to reproduce reported bugs without an unusual/exotic platform/configuration&lt;br&gt;&lt;li/&gt;we will try to be as fair and objective as possible, however if we cannot afford some bounties or&amp;nbsp;&amp;nbsp;if we made stupid mistakes in the terms published that allow exploitation in an unintended way, we&amp;nbsp;&amp;nbsp;reserve the right to refuse bounties. Please be fair and reasonable too!&lt;br&gt;&lt;/ul&gt;&lt;br&gt;&lt;br&gt;SEVERITY&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; BOUNTY&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;EXTRA TERMS&lt;br&gt;-------------------------------------------------------------------------&lt;br&gt;XSS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€50&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br&gt;&lt;br&gt;CSRF&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; €50&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; if user data can be manipulated through 3rd party websites&lt;br&gt;&lt;br&gt;SQL Injection&amp;nbsp;&amp;nbsp; €100&lt;br&gt;&lt;br&gt;Capturing a user&lt;br&gt;account&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€150&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Brute-forcing, phishing or MITM are not applicable. Using XSS: &lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XSS bounty above will apply.&lt;br&gt;&lt;br&gt;Severe DoS&lt;br&gt;opportunity&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€100&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;When a particular request/URL causes effective DoS with &lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 hit per 60 seconds (yes we know about forum search and&lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; best merchant combination calculations, they are slow...)&lt;br&gt;&lt;br&gt;Remote code&lt;br&gt;execution/login&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€300&lt;br&gt;&lt;br&gt;Remote code exec.&lt;br&gt;as root&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€1000&lt;br&gt;&lt;br&gt;Any of the above &lt;br&gt;when caused by 3rd&lt;br&gt;party bug with fix&lt;br&gt;available for 48h&lt;br&gt;or longer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€200&lt;br&gt;&lt;br&gt;Any of the above &lt;br&gt;when caused by 3rd&lt;br&gt;party bug with fix&lt;br&gt;available for &amp;lt;48h €0 (because we'll hopefully fix it automatically)&lt;br&gt;&lt;br&gt;Any of the above&lt;br&gt;when caused by 3rd&lt;br&gt;party bug with NO&lt;br&gt;fix available yet&amp;nbsp;&amp;nbsp;CONTACT DEBIAN/appropriate authorities urgently!&lt;br&gt;&lt;br&gt;&lt;/blockquote&gt;&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:34:48 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7192343.html#7192343</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:34:48Z</dc:date>
    </item>
    <item>
      <title>Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7192337.html#7192337</link>
      <description>&lt;blockquote&gt;&lt;br&gt;&lt;br&gt;Geizhals Bug Bounty Program&lt;br&gt;===========================================&lt;br&gt;DRAFT, valid from 21.12.2013 as published at that date.&lt;br&gt;&lt;br&gt;&lt;br&gt;General terms:&lt;br&gt;&lt;br&gt;* applies to websites using the domains: geizhals.at, geizhals.de, geizhals.eu, compare.eu, skinflint.co.uk, cenowarka.pl&lt;br&gt;* we may offer to pay bounties in the form of Amazon vouchers (we will let you choose from Amazon.de, Amazon.co.uk and possibly others if we can pay them without tax issues)&lt;br&gt;* we will publish information about submissions with as much detail as we choose to&lt;br&gt;* first come, first serve - bounties are paid to first submitter only and only once per type of vulnerability (not for different ways of exploiting the same or for each account compromised etc.)&lt;br&gt;* damages caused unnecessarily will be subtracted from bounties (we'll be fair). If too much avoidable damage was caused, we may refuse to pay bounties (please don't do it, this bug bounty program does not exist in order to invite people to cause damage to us)&lt;br&gt;* known vulnerabilities we are trying to fix and published by us already, are excluded&lt;br&gt;* if multiple cases below apply, the highest is paid, except for vulnerable 3rd party code (i.e. Debian packages), where we pay only the bounty for that category (the best matching)&lt;br&gt;* all submissions must be sent to bugbounty@geizhals.at and readable with MUAs without HTML support&lt;br&gt;* we may update the terms / bounties however we wish at any time without prior notice, however for submitted&lt;br&gt;&amp;nbsp;&amp;nbsp;bugs sent before new terms are announced, the old terms will apply&lt;br&gt;* we must be able to reproduce reported bugs without an unusual/exotic platform/configuration&lt;br&gt;* we will try to be as fair and objective as possible, however if we cannot afford some bounties or&amp;nbsp;&amp;nbsp;if we made stupid mistakes in the terms published that allow exploitation in an unintended way, we&amp;nbsp;&amp;nbsp;reserve the right to refuse bounties. Please be fair and reasonable too!&lt;br&gt;&lt;br&gt;SEVERITY&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; BOUNTY&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;EXTRA TERMS&lt;br&gt;-------------------------------------------------------------------------&lt;br&gt;XSS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€50&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br&gt;&lt;br&gt;CSRF&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; €50&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; if user data can be manipulated through 3rd party websites&lt;br&gt;&lt;br&gt;SQL Injection&amp;nbsp;&amp;nbsp; €100&lt;br&gt;&lt;br&gt;Capturing a user&lt;br&gt;account&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€150&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Brute-forcing, phishing or MITM are not applicable. Using XSS: &lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XSS bounty above will apply.&lt;br&gt;&lt;br&gt;Severe DoS&lt;br&gt;opportunity&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€100&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;When a particular request/URL causes effective DoS with &lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 hit per 60 seconds (yes we know about forum search and&lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; best merchant combination calculations, they are slow...)&lt;br&gt;&lt;br&gt;Remote code&lt;br&gt;execution/login&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€300&lt;br&gt;&lt;br&gt;Remote code exec.&lt;br&gt;as root&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€1000&lt;br&gt;&lt;br&gt;Any of the above &lt;br&gt;when caused by 3rd&lt;br&gt;party bug with fix&lt;br&gt;available for 48h&lt;br&gt;or longer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€200&lt;br&gt;&lt;br&gt;Any of the above &lt;br&gt;when caused by 3rd&lt;br&gt;party bug with fix&lt;br&gt;available for &amp;lt;48h €0 (because we'll hopefully fix it automatically)&lt;br&gt;&lt;br&gt;Any of the above&lt;br&gt;when caused by 3rd&lt;br&gt;party bug with NO&lt;br&gt;fix available yet&amp;nbsp;&amp;nbsp;CONTACT DEBIAN/appropriate authorities urgently!&lt;br&gt;&lt;br&gt;&lt;/blockquote&gt;&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:34:48 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7192337.html#7192337</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:34:48Z</dc:date>
    </item>
    <item>
      <title>Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7192336.html#7192336</link>
      <description>&lt;br&gt;&lt;div class=code&gt;&lt;pre&gt;&#xD;
&#xD;
Geizhals Bug Bounty Program&#xD;
===========================================&#xD;
DRAFT, valid from 21.12.2013 as published at that date.&#xD;
&#xD;
&#xD;
General terms:&#xD;
&#xD;
* applies to websites using the domains: geizhals.at, geizhals.de, geizhals.eu, compare.eu, skinflint.co.uk, cenowarka.pl&#xD;
* we may offer to pay bounties in the form of Amazon vouchers (we will let you choose from Amazon.de, Amazon.co.uk and possibly others if we can pay them without tax issues)&#xD;
* we will publish information about submissions with as much detail as we choose to&#xD;
* first come, first serve - bounties are paid to first submitter only and only once per type of vulnerability (not for different ways of exploiting the same or for each account compromised etc.)&#xD;
* damages caused unnecessarily will be subtracted from bounties (we'll be fair). If too much avoidable damage was caused, we may refuse to pay bounties (please don't do it, this bug bounty program does not exist in order to invite people to cause damage to us)&#xD;
* known vulnerabilities we are trying to fix and published by us already, are excluded&#xD;
* if multiple cases below apply, the highest is paid, except for vulnerable 3rd party code (i.e. Debian packages), where we pay only the bounty for that category (the best matching)&#xD;
* all submissions must be sent to bugbounty@geizhals.at and readable with MUAs without HTML support&#xD;
* we may update the terms / bounties however we wish at any time without prior notice, however for submitted&#xD;
  bugs sent before new terms are announced, the old terms will apply&#xD;
* we must be able to reproduce reported bugs without an unusual/exotic platform/configuration&#xD;
* we will try to be as fair and objective as possible, however if we cannot afford some bounties or  if we made stupid mistakes in the terms published that allow exploitation in an unintended way, we  reserve the right to refuse bounties. Please be fair and reasonable too!&#xD;
&#xD;
SEVERITY           BOUNTY            EXTRA TERMS&#xD;
-------------------------------------------------------------------------&#xD;
XSS                €50               &#xD;
&#xD;
CSRF               €50               if user data can be manipulated through 3rd party websites&#xD;
&#xD;
SQL Injection   €100&#xD;
&#xD;
Capturing a user&#xD;
account            €150              Brute-forcing, phishing or MITM are not applicable. Using XSS: &#xD;
                                     XSS bounty above will apply.&#xD;
&#xD;
Severe DoS&#xD;
opportunity        €100              When a particular request/URL causes effective DoS with &#xD;
                                     1 hit per 60 seconds (yes we know about forum search and&#xD;
                                     best merchant combination calculations, they are slow...)&#xD;
&#xD;
Remote code&#xD;
execution/login    €300&#xD;
&#xD;
Remote code exec.&#xD;
as root            €1000&#xD;
&#xD;
Any of the above &#xD;
when caused by 3rd&#xD;
party bug with fix&#xD;
available for 48h&#xD;
or longer          €200&#xD;
&#xD;
Any of the above &#xD;
when caused by 3rd&#xD;
party bug with fix&#xD;
available for &amp;lt;48h €0 (because we'll hopefully fix it automatically)&#xD;
&#xD;
Any of the above&#xD;
when caused by 3rd&#xD;
party bug with NO&#xD;
fix available yet  CONTACT DEBIAN/appropriate authorities urgently!&#xD;
&#xD;
&lt;/pre&gt;&lt;/div&gt;&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:34:48 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7192336.html#7192336</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:34:48Z</dc:date>
    </item>
    <item>
      <title>Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7192338.html#7192338</link>
      <description>&lt;blockquote&gt;&lt;br&gt;&lt;br&gt;Geizhals Bug Bounty Program&lt;br&gt;===========================================&lt;br&gt;DRAFT, valid from 21.12.2013 as published at that date.&lt;br&gt;&lt;br&gt;&lt;br&gt;General terms:&lt;br&gt;&lt;br&gt;&lt;ul&gt;&lt;br&gt;&lt;li/&gt; applies to websites using the domains: geizhals.at, geizhals.de, geizhals.eu, compare.eu, skinflint.co.uk, cenowarka.pl&lt;br&gt;&lt;li/&gt;we may offer to pay bounties in the form of Amazon vouchers (we will let you choose from Amazon.de, Amazon.co.uk and possibly others if we can pay them without tax issues)&lt;br&gt;&lt;li/&gt;we will publish information about submissions with as much detail as we choose to&lt;br&gt;&lt;li/&gt;first come, first serve - bounties are paid to first submitter only and only once per type of vulnerability (not for different ways of exploiting the same or for each account compromised etc.)&lt;br&gt;&lt;li/&gt;damages caused unnecessarily will be subtracted from bounties (we'll be fair). If too much avoidable damage was caused, we may refuse to pay bounties (please don't do it, this bug bounty program does not exist in order to invite people to cause damage to us)&lt;br&gt;&lt;li/&gt;known vulnerabilities we are trying to fix and published by us already, are excluded&lt;br&gt;&lt;li/&gt;if multiple cases below apply, the highest is paid, except for vulnerable 3rd party code (i.e. Debian packages), where we pay only the bounty for that category (the best matching)&lt;br&gt;&lt;li/&gt;all submissions must be sent to bugbounty@geizhals.at and readable with MUAs without HTML support&lt;br&gt;&lt;li/&gt;we may update the terms / bounties however we wish at any time without prior notice, however for submitted bugs sent before new terms are announced, the old terms will apply&lt;br&gt;&lt;li/&gt;we must be able to reproduce reported bugs without an unusual/exotic platform/configuration&lt;br&gt;&lt;li/&gt;we will try to be as fair and objective as possible, however if we cannot afford some bounties or&amp;nbsp;&amp;nbsp;if we made stupid mistakes in the terms published that allow exploitation in an unintended way, we&amp;nbsp;&amp;nbsp;reserve the right to refuse bounties. Please be fair and reasonable too!&lt;br&gt;&lt;/ul&gt;&lt;br&gt;&lt;br&gt;SEVERITY&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; BOUNTY&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;EXTRA TERMS&lt;br&gt;-------------------------------------------------------------------------&lt;br&gt;XSS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€50&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br&gt;&lt;br&gt;CSRF&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; €50&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; if user data can be manipulated through 3rd party websites&lt;br&gt;&lt;br&gt;SQL Injection&amp;nbsp;&amp;nbsp; €100&lt;br&gt;&lt;br&gt;Capturing a user&lt;br&gt;account&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€150&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Brute-forcing, phishing or MITM are not applicable. Using XSS: &lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XSS bounty above will apply.&lt;br&gt;&lt;br&gt;Severe DoS&lt;br&gt;opportunity&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€100&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;When a particular request/URL causes effective DoS with &lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 hit per 60 seconds (yes we know about forum search and&lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; best merchant combination calculations, they are slow...)&lt;br&gt;&lt;br&gt;Remote code&lt;br&gt;execution/login&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€300&lt;br&gt;&lt;br&gt;Remote code exec.&lt;br&gt;as root&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€1000&lt;br&gt;&lt;br&gt;Any of the above &lt;br&gt;when caused by 3rd&lt;br&gt;party bug with fix&lt;br&gt;available for 48h&lt;br&gt;or longer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€200&lt;br&gt;&lt;br&gt;Any of the above &lt;br&gt;when caused by 3rd&lt;br&gt;party bug with fix&lt;br&gt;available for &amp;lt;48h €0 (because we'll hopefully fix it automatically)&lt;br&gt;&lt;br&gt;Any of the above&lt;br&gt;when caused by 3rd&lt;br&gt;party bug with NO&lt;br&gt;fix available yet&amp;nbsp;&amp;nbsp;CONTACT DEBIAN/appropriate authorities urgently!&lt;br&gt;&lt;br&gt;&lt;/blockquote&gt;&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:34:48 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7192338.html#7192338</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:34:48Z</dc:date>
    </item>
    <item>
      <title>Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7387623.html#7387623</link>
      <description>&lt;blockquote&gt;&lt;br&gt;&lt;br&gt;Geizhals Bug Bounty Program&lt;br&gt;===========================================&lt;br&gt;DRAFT, valid from 27.11.2014 as published at that date.&lt;br&gt;&lt;br&gt;&lt;br&gt;General terms:&lt;br&gt;&lt;br&gt;&lt;ul&gt;&lt;br&gt;&lt;li/&gt; applies to websites explicitly and directly using the domains: geizhals.at, geizhals.de, geizhals.eu, compare.eu, skinflint.co.uk, cenowarka.pl, bepixelung.org, metashop.at&lt;br&gt;&lt;li/&gt;in some cases, multiple reports for seemingly different websites might refer to the exact same problem / piece of code, because e.g. skinflint.co.uk uses the same code as geizhals.at etc. - here we will consider these multiple reports as one at our discretion. Specifically, this is true for Forum HTML filtering in multiple places (guestbook, posts, signature ...)&lt;br&gt;&lt;li/&gt;we may offer to pay bounties in the form of Amazon vouchers (we will let you choose from Amazon.de, Amazon.co.uk and possibly others if we can pay them without tax issues)&lt;br&gt;&lt;li/&gt;we will publish information about submissions with as much detail as we choose to&lt;br&gt;&lt;li/&gt;first come, first serve - bounties are paid to first submitter only and only once per type of vulnerability (not for different ways of exploiting the same or for each account compromised etc.)&lt;br&gt;&lt;li/&gt;damages caused unnecessarily will be subtracted from bounties (we'll be fair). If too much avoidable damage was caused, we may refuse to pay bounties (please don't do it, this bug bounty program does not exist in order to invite people to cause damage to us)&lt;br&gt;&lt;li/&gt;known vulnerabilities we are trying to fix and published by us already, are excluded&lt;br&gt;&lt;li/&gt;if multiple cases below apply, the highest is paid, except for vulnerable 3rd party code (i.e. Debian packages), where we pay only the bounty for that category (the best matching)&lt;br&gt;&lt;li/&gt;all submissions must be sent to bugbounty@geizhals.at and readable with MUAs without HTML support&lt;br&gt;&lt;li/&gt;exploit details must not be published elsewhere before we've had reasonable time to fix the problem&lt;br&gt;&lt;li/&gt;we may update the terms / bounties however we wish at any time without prior notice, however for submitted bugs sent before new terms are announced, the old terms will apply&lt;br&gt;&lt;li/&gt;we must be able to reproduce reported bugs without an unusual/exotic platform/configuration&lt;br&gt;&lt;li/&gt;we will try to be as fair and objective as possible, however if we cannot afford some bounties or&amp;nbsp;&amp;nbsp;if we made stupid mistakes in the terms published that allow exploitation in an unintended way, we&amp;nbsp;&amp;nbsp;reserve the right to refuse bounties. Please be fair and reasonable too!&lt;br&gt;&lt;/ul&gt;&lt;br&gt;&lt;br&gt;SEVERITY&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; BOUNTY&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;EXTRA TERMS&lt;br&gt;-------------------------------------------------------------------------&lt;br&gt;XSS&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€100&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br&gt;&lt;br&gt;CSRF&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; €100&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; if user data can be manipulated through 3rd party websites&lt;br&gt;&lt;br&gt;SQL Injection&amp;nbsp;&amp;nbsp; €200&lt;br&gt;&lt;br&gt;Capturing a user&lt;br&gt;account&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€150&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Brute-forcing, phishing or MITM are not applicable. Using XSS: &lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; XSS bounty above will apply.&lt;br&gt;&lt;br&gt;Severe DoS&lt;br&gt;opportunity&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€200&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;When a particular request/URL causes effective DoS with &lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 hit per 60 seconds (yes we know about forum search and&lt;br&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; best merchant combination calculations, they are slow...)&lt;br&gt;&lt;br&gt;Remote code&lt;br&gt;execution/login&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€500&lt;br&gt;&lt;br&gt;Remote code exec.&lt;br&gt;as root&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€1000&lt;br&gt;&lt;br&gt;Any of the above &lt;br&gt;when caused by 3rd&lt;br&gt;party bug with fix&lt;br&gt;available for 48h&lt;br&gt;or longer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;€200&lt;br&gt;&lt;br&gt;Any of the above &lt;br&gt;when caused by 3rd&lt;br&gt;party bug with fix&lt;br&gt;available for &amp;lt;48h €0 (because we'll hopefully fix it automatically)&lt;br&gt;&lt;br&gt;Any of the above&lt;br&gt;when caused by 3rd&lt;br&gt;party bug with NO&lt;br&gt;fix available yet&amp;nbsp;&amp;nbsp;CONTACT DEBIAN/appropriate authorities urgently!&lt;br&gt;&lt;br&gt;&lt;/blockquote&gt;&lt;br&gt;&lt;br&gt;&lt;hr/&gt;&lt;br&gt;2014-11-27: more explicit wording regarding the domain/URL scope&lt;br&gt;2013-12-26: added bepixelung.org, metashop.at&lt;br&gt;2013-12-19: increased bounties&lt;br&gt;&lt;br&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:34:48 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7387623.html#7387623</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:34:48Z</dc:date>
    </item>
    <item>
      <title>Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7996855.html#7996855</link>
      <description>The Geizhals Bug Bounty Program page has moved to &lt;a href="http://unternehmen.geizhals.at/about/en/info/bugbounty-program/" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;unternehmen.geizhals.at/&lt;wbr/&gt;about/&lt;wbr/&gt;en/&lt;wbr/&gt;info/&lt;wbr/&gt;bugbounty-program/&lt;wbr/&gt;&lt;/a&gt; &lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:34:48 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7996855.html#7996855</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:34:48Z</dc:date>
    </item>
    <item>
      <title>Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7996856.html#7996856</link>
      <description>&lt;strong&gt;&lt;br&gt;The Geizhals Bug Bounty Program page has moved to &lt;a href="http://unternehmen.geizhals.at/about/en/info/bugbounty-program/" rel="noopener" target="_blank"&gt;http:/&lt;wbr/&gt;/&lt;wbr/&gt;unternehmen.geizhals.at/&lt;wbr/&gt;about/&lt;wbr/&gt;en/&lt;wbr/&gt;info/&lt;wbr/&gt;bugbounty-program/&lt;wbr/&gt;&lt;/a&gt; &lt;br&gt;&lt;/strong&gt;&lt;/p&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:34:48 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7996856.html#7996856</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:34:48Z</dc:date>
    </item>
    <item>
      <title>Geizhals Code Bounty</title>
      <link>http://forum.geizhals.at/t836538,7996857.html#7996857</link>
      <description>&lt;strong&gt;&lt;br&gt;The Geizhals Bug Bounty Program page has moved to &lt;a href="https://unternehmen.geizhals.at/about/en/info/bugbounty-program/" rel="noopener" target="_blank"&gt;https:/&lt;wbr/&gt;/&lt;wbr/&gt;unternehmen.geizhals.at/&lt;wbr/&gt;about/&lt;wbr/&gt;en/&lt;wbr/&gt;info/&lt;wbr/&gt;bugbounty-program/&lt;wbr/&gt;&lt;/a&gt; &lt;br&gt;&lt;/strong&gt;&lt;/p&gt;&lt;br/&gt;</description>
      <pubDate>Wed, 11 Dec 2013 18:34:48 GMT</pubDate>
      <guid>http://forum.geizhals.at/t836538,7996857.html#7996857</guid>
      <dc:creator>mjy@geizhals.at</dc:creator>
      <dc:date>2013-12-11T18:34:48Z</dc:date>
    </item>
  </channel>
</rss>
