{"id":26820,"date":"2024-01-04T14:27:59","date_gmt":"2024-01-04T14:27:59","guid":{"rendered":"https:\/\/online-pre-tmp.moneytrans.eu\/congo-rdc\/politica-de-vulnerabilidades\/"},"modified":"2024-01-04T14:28:01","modified_gmt":"2024-01-04T14:28:01","slug":"politica-de-vulnerabilidades","status":"publish","type":"page","link":"https:\/\/online-pre-tmp.moneytrans.eu\/congo-rdc\/en\/politica-de-vulnerabilidades\/","title":{"rendered":"Politica de vulnerabilidades"},"content":{"rendered":"\t\t
Moneytrans is a fintech company committed to promoting diversity and financial inclusion. We understand the importance of maintaining high IT security standards and appreciate the support of IT security researchers and members of cybersecurity communities in achieving this goal. If you discover an IT security vulnerability in any of our applications, we ask that you please inform us as soon as possible before making the issue public. This is called responsible disclosure, allowing us to take the necessary measures to address the problem. In this document, researchers will find all the information needed to conduct these activities in a way that can be mutually beneficial in a safe way.<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t After confirming the presence of a vulnerability or coming across sensitive data (such as personally identifiable information, financial details, or proprietary information, including trade secrets belonging to any entity), you must stop your testing, promptly notify us, and refrain from sharing this data with any other individuals or parties.<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t We are making continuous significant efforts to address the issues we know about and prevent new issues from appearing. However, the ICT environment is constantly evolving, and so are the cybersecurity vulnerabilities.<\/p>\n Although we focus mainly on information and API security, safeguarding our customers’ data is paramount. Therefore, we’re particularly interested in receiving submissions related to the following:<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t The ultimate severity assessment of a vulnerability can only be ascertained after a comprehensive evaluation by the security officers and analysts.<\/p>\n Moneytrans employs the CVSS v3 industry standard as a foundational measure for determining the issue\u2019s severity. Regardless of the numerical score, potential factors that heighten or mitigate risk should be considered in light of the contextual details provided.<\/p>\n More details about the scoring methodology can be checked out here:<\/p>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\tGuidelines <\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Please note the general guidelines of this policy. <\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
Notify us immediately after you discover a real or potential security issue. <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
Make every effort to avoid privacy violations, degradation of user experience, disruption to production systems, and destruction or manipulation of data. <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
Only use exploits to the extent necessary to confirm a vulnerability\u2019s presence. <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
Give us a reasonable amount of time to resolve the issue before you publicly disclose it. <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
You do not intentionally compromise the privacy or safety of Moneytrans personnel or any third parties. <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
You do not intentionally compromise the intellectual property or other commercial or financial interests of any Moneytrans personnel, entities, or third parties. <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
In Scope <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n
Vulnerability classification <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t