Skip to main content

Security Acknowledgments

We recognize and thank security researchers who have responsibly disclosed vulnerabilities to help improve the security of sdburt.com.

Recognition Policy

Security researchers who responsibly disclose valid vulnerabilities in accordance with our Security Policy will be recognized here unless they prefer to remain anonymous.

Hall of Fame

No security vulnerabilities have been reported yet. This section will be updated as researchers contribute to the security of this website.

What We Recognize

We acknowledge researchers who have reported:

  • Critical Vulnerabilities: Remote code execution, SQL injection, authentication bypass
  • High Severity: Cross-site scripting (XSS), security header bypass, privilege escalation
  • Medium Severity: Information disclosure, clickjacking, content injection
  • Low Severity: Security misconfigurations, minor information leakage

Recognition Format

When we recognize researchers, we include:

  • Researcher Name: As provided by the researcher
  • Date: When the vulnerability was resolved
  • Vulnerability Type: General category (e.g., XSS, CSP Bypass)
  • Severity: Based on impact and exploitability
  • Website/Social: If provided and researcher consents

Vulnerability Categories

🔴 Critical

Vulnerabilities that could lead to complete system compromise

  • Remote code execution
  • Authentication bypass
  • Complete data breach

🟠 High

Significant security impact with potential for serious exploitation

  • Cross-site scripting (XSS)
  • Security header bypass
  • Privilege escalation

🟡 Medium

Moderate security impact requiring specific conditions

  • Information disclosure
  • Clickjacking
  • Content injection

🟢 Low

Minor security issues with limited impact

  • Security misconfigurations
  • Minor information leakage
  • Non-exploitable findings

Reporting Guidelines

To be eligible for recognition, please follow our Security Policy guidelines:

  1. Report vulnerabilities responsibly and privately
  2. Allow reasonable time for remediation before public disclosure
  3. Provide clear reproduction steps and impact assessment
  4. Act in good faith and avoid accessing or modifying others' data

Contact

To report a security vulnerability:

  • Email: seandburt@gmail.com
  • Subject: "Security Vulnerability Report"
  • Response Time: 48 hours maximum

Thank you to all security researchers who help keep the web safer through responsible disclosure practices.

Last Updated: January 6, 2025
Version: 1.0