Log in
Attack vector | Vulnerability class | Rewards for a detailed error report | Rewards for a basic error report | Examples of vulnerabilities |
---|---|---|---|---|
Chromium sandbox escape | Bypassing the sandbox mechanism in any way | $8,200 | $4,900 | Executing arbitrary commands in the OS on behalf of a privileged browser process |
Remote execution of code in the browser | Vulnerabilities associated with operation logic issues or memory corruption | $4,900 | $2,400 | Executing code in the context of a renderer process inside a sandbox |
Bypassing the Same Origin Policy | UXSS, browser API vulnerabilities | $2,400 | $1,200 | UXSS, obtaining data of arbitrary origin |
Vulnerabilities in Yandex Browser services and mechanisms | Vulnerabilities of account synchronization or password storage, critical data autosuggest vulnerabilities | $2,400 | $1,200 | Getting access to the password manager data |
NTP (new tab page) implementation vulnerabilities | Getting access to interfaces or NTP context with subsequent access to user data | $1,700 | $800 | Getting access to the browser API available for NTP from an arbitrary site context |
Bypassing HTTPS, vulnerabilities in SSL/TLS implementation, bypassing Yandex Protect protection mechanisms | Bypassing the Secure WI-FI mechanism, bypassing the Safebrowsing mechanisms | $1,700 | $800 | Accessing blocked sites or disabling notifications on sites with untrusted certificates |
Replacing user interface elements | Address Bar Spoofing, notification spoofing vulnerabilities | $800 | $400 | Address Bar Spoofing |
Bypassing Content Security Policy | Any bypass methods except for extension variants or HTTP/HTTPS header substitution | $800 | $400 | Bypassing rules from a site's CSP directives |
Built-in extensions vulnerabilities | XSS, XXE, CSRF, disclosure of sensitive information | $800 | $400 | XSS in embedded extensions |
Different fraud methods | $300 — $3000 | Ячейка | Ячейка | Ячейка |