You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We release patches for security vulnerabilities. Which versions are eligible for receiving such patches depends on the CVSS v3.0 Rating:
6
+
7
+
| Version | Supported |
8
+
| ------- | ------------------ |
9
+
| 1.x |:white_check_mark:|
10
+
11
+
## Reporting a Vulnerability
12
+
13
+
If you discover a security vulnerability within this package, please send an email to Vincent Auger at vincent.auger@gmail.com. All security vulnerabilities will be promptly addressed.
14
+
15
+
Please include the following information in your report:
16
+
17
+
- Type of issue (e.g., buffer overflow, SQL injection, cross-site scripting, etc.)
18
+
- Full paths of source file(s) related to the manifestation of the issue
19
+
- The location of the affected source code (tag/branch/commit or direct URL)
20
+
- Any special configuration required to reproduce the issue
21
+
- Step-by-step instructions to reproduce the issue
22
+
- Proof-of-concept or exploit code (if possible)
23
+
- Impact of the issue, including how an attacker might exploit the issue
24
+
25
+
We will respond to your report within 48 hours and work with you to understand and address the issue.
26
+
27
+
## Disclosure Policy
28
+
29
+
When we receive a security bug report, we will:
30
+
31
+
1. Confirm the problem and determine the affected versions.
32
+
2. Audit code to find any potential similar problems.
33
+
3. Prepare fixes for all supported releases.
34
+
4. Release new security fix versions as soon as possible.
35
+
36
+
Thank you for helping keep Sierra PHP SDK and its users safe!
0 commit comments