Skip to content

Latest commit

 

History

History
12 lines (10 loc) · 630 Bytes

man-in-the-middle.md

File metadata and controls

12 lines (10 loc) · 630 Bytes

Vulnerability Subject to Man-In-The-Middle Attack

Vulnerability Overview

Man-in-the-middle attack is an attack technique that a third party intercepts the communication between two parties for the purpose of eavesdropping on and tampering with the communication.

Is This Identified as a Vulnerability?

No

Supplementary Information

A successful attack that requires the man-in-the-middle attack is not identified as a vulnerability.
This case is not handled as a vulnerability for the Bug Bounty Program. However, if we determine that the risk is high (example: RCE), we may identify this case as a vulnerability.