Submit to Vulnerability Labs - Advisories, Zero-Day Vulnerabilities, Exploits & PoC
Welcome to the submission guidelines page of the vulnerability labs. The vulnerability laboratory security team verifies security reports & zero-day vulnerabilities. Note that the policy of the laboratory can be changed without public user notify. Researchers can use the following information lines to submit own security issues. Please fill in as much information as possible to speed up the security analysis, vulnerability verification or reproduce procedure.
*required -- Vulnerable Product(s):
*required -- Affected Version(s):
*required -- Vulnerability Typus:
*required -- Description:
*required -- Technical Details:
*required -- PoC or Exploitcode:
*required -- Author/Group:
*optional -- Vendor-URL:
*optional -- Product-URL:
*optional -- Demo-URL:
*optional -- Fix or Patch:
Note: The vulnerabilities will be published as advisory or bulletin with the following format as (Example)
Please, Respect the official Rules of Submission
No issues with specific target exploitation or destructive live hacks, links/ips (censor it or don't send!)
Non client-side vulnerabilities can only be published when the manufacturer service or firm is popular
No 3'rd or 2'nd party publishment of advisories, videos, vulnerabilities & documents
Bad detailed vulnerabilities, security papers, security videos & security advisories or buletins
No publishment of stolen, ripped or grabbed documents, advisories, vulnerabilities details
No website vulnerability submission. Only allowed for trusted and verified core team members
What Vulnerability-Lab do with Issues (Vulnerabilities/Advisories)?
We verify the vulnerability & send the complete advisory to the product manufacturer or vendor. We publish the advisory report or vulnerability as a stable reference with your author credentials, after the vendor notify & development team patch. When a vulnerability has a specific level of severity, we request the CVE-ID or CWE-ID for the authors. After that we do attach the reference information with ids and links to the undisclosed advisory. Then we process to publish the vulnerability or report by usage of different news-sites, partner-portals, security appliance services, magazines, rss feeds & dev communities..
Secure Vulnerability Discovery Process Policy

We detect the following type of vulnerabilities ...
Note: Vulnerabilities (CVE)
Cross Site Scripting (Persistent) Vulnerabilities
Cross Site Request Forgery
Click-Jacking & Cam-Jacking
Unrestricted & unauthorized Local/Remote File Include
Directory Traversal / Path Traversal
Auth, Filter or Exception Bypass
SQL Injection & Blind SQL Injection
Input Validation Vulnerabilities (Persistent/Non-Persistent)
Stack / Buffer / Heap / Integer / Unicode -Overflows
Local/Remote Privilege Escalation
Format Strings
Memory Corruption
Division/Devide by zero bugs & vulnerabilities
Pointer Vulnerabilities (Null Pointer, Access Violation, Read, Write)
Local/Remote Command Execution
Local/Remote Code Execution
Denial of Service - Firmware Freeze, Service Blocks or Shutdown
Information Leaking & Information Disclosure
Weak Algorythm, weak Encryption & weak Chiffre
Misconfiguration of OS, Systems & Applications
Structure & Design Errors/Flows
Kernel Panic / Black & Blue Screens
Stable Application- & Software- Crashs
In the following available issue classes ...
Web Application Vulnerabilities (Open Source) (Remote)
Web Application Vulnerabilities (Closed Source) (Remote)
Web Application Online Services Vulnerabilities (Remote)
Local Software Vulnerabilities (Open Source) (Windows & Linux)
Local Software Vulnerabilities (Closed Source)(Windows & Linux)
Local OS Vulnerabilities (Closed Source) (Windows)
Local Kernel Vulnerabilities (Open Source) (Linux)
Local Device & Controls Vulnerabilities (Hardware)
Remote Software Vulnerabilities (Open Source)
Remote Software Vulnerabilities (Closed Source)
Remote OS Vulnerabilities (Closed Source) (Windows)
Remote Kernel Vulnerabilities (Open Source) (Linux)
Remote Device & Controls Vulnerabilities (Hardware)
Why you should publish zero-day vulnerabilities in the Vulnerability-Lab?
- Researchers can store a stable public reference profile with own credits or credentials
- The core team can help researchers to verify vulnerabilities in security reports (advisories) or analysis
- We request CVE/CWE-ID or other tracking ids from a pool
- Our core team informs the vendor via encrypted communication for a secure exchange of details
- Representative and responsible team and partners with active mailinglist news notify
- Service is 24/7h remote available - IRC, Magazine, Lab-News, Hacktivity, Programs & other modules
- The role system of the lab allows to give advanced researcher more access to issue details & services
- Active researchers can also get free access to partner security events & private security meetings
- The individual that identifies a vulnerability can interact in the vendor communication & payment process
- Stable payouts, valuable prizes, commercial rewards- & award nomination ceremony for bug bounties
Contact Details & Information
Payment Process Restrictions, Law Policy & Conditions
We provide regular and banking transfers only to registered verified international accounts. We are able to cooperate and reward researchers with payments only under the below listed conditions. The payment terms and process has been integrated to prevent fraud, researcher ident theft & money laundering.
No payments via westbank union transfer agency
No debit cards with unofficial registered non-business account users
No transfer of money to third party -mullies, -companies or -family members
No payments via paypal, bitcoin wallet or online wire transfer
No cashout for researchers that do violate a manufacturer or vendor contratcs/signs
Next to a payment an in-depth examination have noticed researcher and individuals who act by negative undergo, spam or criminal activities. The laboratory infrastructure will not pay received credits to criminals, spammers, forcers or cheaters. The credit will be paid to a legal non-profit oragnization in the case above. Reason for the action are current conflicts of the laws in germany and the european union.