Vulnerability Reports definition

Vulnerability Reports means bug reports or other vulnerability information, in text, graphics, image, software, works of authorship of any kind, and information or other material that Finders provide or otherwise make available through the HackerOne Platform to Customer resulting from participation in a Program.
Vulnerability Reports means a confidential report submitted and listed by a Security Professional containing security vulnerabilities found during the testing of the Asset(s) in scope for a given Security Program.

Examples of Vulnerability Reports in a sentence

  • The parties acknowledge and agree that Customer and/or its licensors own all right, title and interest to the Assets and any Customer Data made available by the Customer through the Site or Services and any findings contained in the Vulnerability Reports created specifically and uniquely for the Customer, but excluding any Cobalt Property or Security Professional Property and any Intellectual Property Rights therein.

  • The Contractor must address all "high" deficiencies previously reported in the POAMS, Vulnerability Reports, and any other security risk identified before submitting the package to the Government for acceptance and document all remaining deficiencies in a system Plan of Actions and Milestones (POA&M).

  • The Hunter agrees to assign, free of charge, its IPRs on the Vulnerability Reports to the relevant Customer for all countries where they are protected, in all languages, for the entire duration of the legal IPRs of the authors or their successors, according to all applicable laws, both current and future, including any extensions that may be made to this duration and in all forms, presentations and by all processes both current and future.

  • The Company does not propose nor make any modification/adaptation on the Vulnerability Reports.

  • The Company provides support in the drafting of the Bug Bounty Programs and Vulnerability Reports and intervenes, as part of a Bug Bounty Program, only as an intermediary to introduce Hunters to the Customers and its related Customer Users.

  • Assignment of Intellectual Property Rights (IPRs) on the Vulnerability Reports.

  • Categories of data subjects Depending on the scope of the Program Categories of Personal Data Depending on the scope of the Program Purpose of the processing Hosting of Vulnerability Reports Nature of the processing performed by the Company Hosting of Personal Data contained in Vulnerability Reports Categories of recipients Processor: • Hosting OVH - France • Encrypted back up of dedicated servers - OVH Germany (Frankfurt)/Scaleway (Ile-de-France).