If you have found a security vulnerability on quickzon.com, we encourage you to message us immediately. We will review all legitimate vulnerability reports and do our utmost to quickly resolve the matter. Before you report, please review this document, which includes our program fundamentals, bug bounty rewards, and guidelines on what to report.

Fundamentals

If you adhere to the rules below when reporting a security issue to us, we will not initiate a lawsuit or enforcement investigation against you in response to your report. We ask that you:

  1. Give us a reasonable amount of time to review and fix a problem you report before making any information about the report public or sharing such information with others.
  2. Do not interact with a private account (which includes modifying or accessing data from the account) if the account owner has not consented to such actions.
  3. Make a good faith effort to avoid privacy violations and disruptions to others, including (but not limited to) destruction of data and interruption or degradation of our services.
  4. Do not exploit a security issue you discover for any reason. (This includes demonstrating additional risk, such as attempting to compromise sensitive company data or trying to find additional issues.)
  5. Do not violate any other applicable laws or regulations.

Bug Bounty Program

We recognize and reward security researchers who help us keep people safe by reporting vulnerabilities in our services. Monetary bounties for such reports are entirely at Quickzon.com's discretion, based on risk, impact, and other factors. To potentially qualify for a bounty, you must meet the following requirements:

  1. Adhere to our fundamentals (see above).
  2. Report a security bug—that is, identify a vulnerability in our services or infrastructure which creates a security or privacy risk. (Note that Quickzon.com ultimately determines the risk of an issue, and many bugs are not security issues.)
  3. Submit your report via our Contact Us form. Please do not contact employees directly.
  4. If you inadvertently cause a privacy violation or disruption (such as accessing account data, service configurations, or other confidential information) while investigating a problem, be sure to disclose this in your report.
  5. We investigate and respond to all valid reports. Due to the volume of reports we receive, however, we prioritize evaluations based on risk and other factors, and it may take some time before you receive a reply.
  6. We reserve the right to publish reports.

Rewards

Our rewards are based on the impact of a vulnerability. We will update the program over time based on feedback, so please give us feedback on any part of the program you think we can improve on.

  1. Please provide detailed reports with reproducible steps. If the report is not detailed enough to reproduce the problem, it will not be eligible for a bounty.
  2. When duplicates occur, we will award the first report that we can completely reproduce.
  3. Multiple vulnerabilities caused by one underlying issue will be awarded a single bounty.
  4. We determine the bounty reward based on a variety of factors, including (but not limited to) impact, ease of exploitation, and quality of the report.
  5. The amounts below are the maximum we will pay per level. We aim to be fair; all reward amounts are at our discretion.

Critical Severity Vulnerabilities ($200)

Vulnerabilities that cause a privilege escalation on the platform from unprivileged to admin, allow remote code execution, financial theft, etc.

  • Remote Code Execution
  • Remote Shell/Command Execution
  • Vertical Authentication Bypass
  • SQL Injection that leaks targeted data
  • Full access to accounts

High Severity Vulnerabilities ($100)

Vulnerabilities that affect the safety of the platform, including the processes it supports.

  • Lateral Authentication Bypass
  • Disclosure of important information within the company
  • Stored XSS for an extra user
  • Local File Inclusion
  • Insecure handling of authentication cookies

Medium Severity Vulnerabilities ($50)

Vulnerabilities that affect multiple users and need little or no user interaction to trigger.

  • Common logic design flaws and business process defects
  • Insecure object references

Low Severity Vulnerabilities (No Bounty)

Issues that affect single users and need interaction or significant prerequisites (e.g., MITM) to trigger.

  • Open Redirect
  • Reflected XSS
  • Low-sensitivity information leaks

Contact Information
Quickzon LLC
Phone: +1 (254) 708-9715
Email: Contact@quickzon.com
Address: 8423 Stella Link Rd, Houston, TX 77025, United States
Business Hours: Monday – Friday: 8:00 AM – 6:00 PM | Saturday: 8:00 AM – 12:00 PM