There are some submissions that we can't accept for rewards. These are typically issues that we already are aware of, or issues that we think demonstrate business value that outweighs the low-level risk, or low-risk issues that are unlikely to result in a code change. Following vulnerability, classes are ineligible for rewards
                                        
 - 
                                                   Denial of Service
                                                 
- 
                                                   DMARC/ SPF
                                                 
- 
                                                   Self-XSS
                                                 
- 
                                                  Malicious File Upload
                                                 
- 
                                                   Social engineering
                                                 
- 
                                                  Email Spamming / Spoofing
                                                 
- 
                                                  Content Spoofing
                                                 
- 
                                                   Clickjacking and issues are only exploitable through clickjacking that has minimal impact.
                                                 
- 
                                                  CSRF on forms that are available to anonymous users(e.g. the contact form)
                                                 
- 
                                                  CSRF with negligible security impact (e.g. adding to favourites)
                                                 
- 
                                                  Software version number disclosure
                                                 
- 
                                                  Username or Site Name enumeration
                                                 
- 
                                                 Unvalidated Open Redirects or Tab Nabbing
                                                 
- 
                                                   HTML injection
                                                 
- 
                                                  Username or email address enumeration
                                                 
- 
                                                  Phishing attack using RTLO, Unicode/Punycode
                                                 
- 
                                                  Any security weakness or missing best practice without a demonstrable security impact
                                                 
- 
                                                  Descriptive error messages.
                                                 
- 
                                                  Information disclosure with minimal security impact (e.g. stack traces, path disclosure, directory listings, logs, robots.txt, etc)
                                                 
- 
                                                  Clickjacking and issues are only exploitable through clickjacking that has minimal impact.
                                                 
- 
                                                  Lack of Secure and HTTPOnly cookie flags.
                                                 
- 
                                                  Weak or missing captcha/captcha bypass.
                                                 
- 
                                                  SSL Attacks such as BEAST, BREACH, Renegotiation attack 
                                                 
- 
                                                  SSL Forward secrecy not enabled
                                                 
- 
                                                 SSL Insecure cypher suites.
                                                 
- 
                                                 Missing HTTP security headers (including Anti-MIME-Sniffing header X-Content-Type-Options) that do not lead to direct exploitation.
                                                 
- 
                                                 XSS was  only possible by an administrator e.g. administrators can modify HTML templates, that is not an example of an XSS vulnerability.
                                                 
- 
                                                  Self-XSS that has no security impact e.g. injecting HTML into your own RTE editor
                                                 
- 
                                                 Reports of third-party libraries without an actual proof-of-concept. e.g. if you are aware of a vulnerable library, then you need to submit a proof-of-concept showing that our use of the library is vulnerable.