diff --git a/docs/about-hypernode/security-policies/responsible-disclosure-policy.md b/docs/about-hypernode/security-policies/responsible-disclosure-policy.md index 1fe6b6b2..ede9efc7 100644 --- a/docs/about-hypernode/security-policies/responsible-disclosure-policy.md +++ b/docs/about-hypernode/security-policies/responsible-disclosure-policy.md @@ -6,6 +6,7 @@ myst: title: Responsible Disclosure Policy | Security | Hypernode redirect_from: - /en/about/security/responsible-disclosure-policy/ + - /about-hypernode/security-policies/security-hall-of-fame.html --- diff --git a/docs/about-hypernode/security-policies/security-hall-of-fame.md b/docs/about-hypernode/security-policies/security-hall-of-fame.md deleted file mode 100644 index 865390fa..00000000 --- a/docs/about-hypernode/security-policies/security-hall-of-fame.md +++ /dev/null @@ -1,35 +0,0 @@ ---- -myst: - html_meta: - description: Thank you to the individuals and organizations who have responsibly - disclosed vulnerabilities to Hypernode. These people helped keep our systems - secure. - title: Security Hall of Fame | Hypernode -redirect_from: - - /en/about/security/hall-of-fame/ ---- - - - -# Security Hall of Fame - -We would like to thank the following individuals and/or organizations, who have responsibly disclosed vulnerabilities to us. - -| | | | -| ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------- | ------------------------------------------------------------------------------------------------------ | -| [Arthur Sjouw](https://github.com/arthur1472) / [flooris](https://flooris.nl/) | 09 Jun 2023 | Reported access control issues on a Hipex backup server | -| [Yanick De Pater](https://www.linkedin.com/in/ydepater/) / [Reqon B.V.](https://reqon.nl/) | 25 May 2023 | Reported a privilege escalation issue on Hypernode | -| [Swapnil Kothawade](https://www.linkedin.com/in/swapnil-kothawade-813854a7) | 03 Jan 2023 | Reported access control issues in our git repository | -| [Sagar Yadav](https://www.linkedin.com/in/sagaryadav8742/) | 16 Apr 2022 | Reported possible information leakage from a legacy service. | -| [Hatim Chabik](https://twitter.com/H_chabik) | 13 Jan 2022 | Reported a Reflective XSS attack on marketing sites. | -| [Manu Sharma](https://www.linkedin.com/in/manu-sharma-7ba8671aa) | 31 May 2021 | Reported a Reflective XSS attack on marketing sites. | -| [Ghazanfar Ali Kazam](https://twitter.com/p3n73st3r) | 31 May 2021 | Reported information leakage from an internal server. | -| [Akash H. C.](https://www.linkedin.com/in/akash-h-c-4a4090a7) | 9 September 2020 | Reported a password reset token leak | -| [Akash Patil](https://www.linkedin.com/in/akashpatil98/) | 1 August 2020 | Reported an account takeover using IDN homograph attack. | -| [Pethuraj M](https://www.pethuraj.com/) | 1 July 2020 | Reported a flaw in our password reset flow | -| [Miguel Santareno](https://www.linkedin.com/in/miguelsantareno/) | 14 May 2020 | Reported information leakage from marketing sites. | -| [Gaurav Kumar](https://www.facebook.com/drago4344) and [Shivam Dattana](https://www.facebook.com/profile.php?id=100010397858328) / [Team Bugmania](https://www.openbugbounty.org/researchers/bugmania/) | 28 September 2019 | Reported a Cross site scripting (XSS) on magereport.com. | -| [Mike de Landgraaf](https://www.linkedin.com/in/mdelandgraaf/) / MDL Online | 21 March 2019 | Reported a misconfiguration that allowed user impersonation on Hypernode hosted webshops. | -| [Maksym Bendeberia](https://www.linkedin.com/in/jogspokoen/) / [WebSafety Ninja](https://websafety.ninja/) | 12 March 2019 | Reported information leakage from an internal deployment server. | -| [Jan Piet van Dijk](https://www.linkedin.com/in/janpietvandijk/) / [Interwijs B.V.](https://www.interwijs.nl/) | 28 August 2018 | Reported a privilege escalation on Hypernode, leading to a local root exploit. | -| [Wijnand Wieskamp](https://www.linkedin.com/in/wijnand-wieskamp-8a784313/) / [Crystalsoft B.V.](https://www.crystalsoft.nl/) | 1 June 2018 | Reported a misconfiguration that allowed a Hypernode’s preconfigured security settings to be bypassed. | diff --git a/documentation_urls.txt b/documentation_urls.txt index 29b9d1ee..d08418e8 100644 --- a/documentation_urls.txt +++ b/documentation_urls.txt @@ -12,7 +12,6 @@ article: https://support.hypernode.com/en/about/billing/how-to-up-or-downgrade-y article: https://support.hypernode.com/en/about/billing/migration-faq/ article: https://support.hypernode.com/en/about/billing/our-payment-service-provider/ article: https://support.hypernode.com/en/about/billing/supported-payment-methods-in-the-control-panel/ -article: https://support.hypernode.com/en/about/security/hall-of-fame/ article: https://support.hypernode.com/en/about/security/hypernode-security-statement/ article: https://support.hypernode.com/en/about/security/one-of-your-magento-extensions-is-vulnerable/ article: https://support.hypernode.com/en/about/security/responsible-disclosure-policy/