Vulnerabilities found in out of scope resources are unlikely to be rewarded unless they present a serious business risk (at our sole discretion). In general, the following vulnerabilities do not correspond to the severity threshold
Visual typos, spelling mistakes, etc
Findings derived primarily from social engineering (e.g. phishing, etc)
Findings from applications or systems not listed in the ‘Scope’ section
UI/UX bugs, Data entry errors, spelling mistakes, typos, etc
Network level Denial of Service (DoS/DDoS) vulnerabilities
Certificates/TLS/SSL related issues
DNS issues (i.e. MX records, SPF records, etc.)
Server configuration issues (i.e., open ports, TLS, etc.)
Spam or Social Engineering techniques
Security bugs in third-party applications or services
XSS Exploits that do not pose a security risk to 'other' users (Self-XSS)
Login/Logout CSRF-XSS
https/ssl or server-info disclosure related issues
https Mixed Content Scripts
Brute Force attacks
Best practices concerns
Recently (less than 30 days) disclosed 0day vulnerabilities
Username/email enumeration via Login/Forgot Password Page error messages
Missing HTTP security headers
Weak password policy
HTML injection