Yasal sözleşmelerin ve politikaların çevrilmiş sürümleri, yalnızca İngilizce sürümlerin okunmasını ve anlaşılmasını kolaylaştırmak için sunulmuştur. Yasal sözleşmelerin ve politikaların çevrilmiş sürümlerinin sunulmasının amacı, yasal olarak bağlayıcı bir sözleşme oluşturmak değildir ve İngilizce sürümler yasal olarak geçerli olacaktır. Herhangi bir anlaşmazlık veya sorun olması halinde, sizinle olan ilişkimiz için yasal sözleşmelerin ve politikaların İngilizce sürümleri geçerli olacak ve diğer dillerdeki sürümleri geçersiz kılacaktır.
KOORDİNE GÜVENLİK AÇIĞI İFŞA POLİTİKASI
Coordinated Vulnerability Disclosure
GoDaddy encourages researchers to work with us on potential issues in our services or on our website. In order to encourage researchers to work with us, we agree that if, in our sole discretion, we conclude that a disclosure meets all of the guidelines of the GoDaddy Coordinated Disclosure policy, GoDaddy will not bring any private or criminal legal action against the disclosing party.
Non-Qualifying Vulnerabilities
Any domain not contained within GoDaddy is out of scope for the purposes of the Coordinated Vulnerability Disclosure, as is all hosted customer content and third-party programs and plug-ins.
The following actions do not qualify for Coordinated Disclosure and should not be tested by researchers participating in the Program:
- DoS, brute force, user enumeration or DDoS attacks
- Physical attacks
- Phishing attacks
- Any bug that relies on Social engineering
- CRIME/BEAST attacks
- Logout CSRF
- Banner or version disclosures
- Missing SPF records
- Directory listing (unless sensitive data can be found)
- Blackhat SEO techniques
- Any bug that relies upon an outdated browser
GoDaddy will not accept reports from automated vulnerability scanners.
Qualifying Vulnerabilities
GoDaddy will accept a report of any vulnerability that substantially affects the confidentiality or integrity of any eligible GoDaddy service. Eligible vulnerabilities include, but are not limited to:
- Cross Site Scripting (XSS)
- Authentication and Authorization Flaws
- Cross Site Request Forgery (CSRF)
- Remote Code Execution
- SQL Injection
- Directory Traversal
- Click-jacking
- Privilege Escalation
Suggestions for Good Reports
- The more detailed your steps for reproducing the bug, the better. This should include any pages that you visited, user IDs, links clicked, etc.
- Videos and images are always useful but are even more useful if accompanied by a description.
- Exploit code that consistently works can allow us to verify your vulnerability more quickly.
- Remember – details, details, details!
Confidentiality
Any information that you collect about GoDaddy, GoDaddy employees, or GoDaddy customers (“Confidential Information”) through the Coordinated Vulnerability Disclosure program must be kept confidential and may only be used in connection with the Program. You may disclose vulnerabilities only after proper remediation has occurred and you may not disclose Confidential Information without GoDaddy’s prior written consent. Any disclosure of Confidential Information outside of this requirement will result in immediate removal from the Program.
Legal
By participating in GoDaddy ‘s Coordinated Vulnerability Disclosure, you acknowledge that you have read and agree to GoDaddy’s Universal Terms of Service Agreement and Privacy Policy.
Your testing must not violate any law, disrupt services, or compromise any data that is not your own.