Visma
Summary
Visma seems to have a Bug Bounty or Vulnerability Disclosure program managed at Intigriti. Our bots had reported us they appear to be offering rewards πΈ π° π.
As this page is programmatically generated, we do not guarantee the accuracy or completeness of the data and cannot be held liable for any errors or omissions. Users are advised to verify the information directly from the official sources before taking any action based on the content found on this website.
In Scope
564141518 (iOS) | * Private screen exposure in the app | * Stack traces from api calls | * Jailbroken devices is out of scope | * All options for login are out of scope, except eAccounting (please see details in the "Getting Started instructions document" | | | )
accountsettings.connect.identity.stagaws.visma.com
admin.stage.vismaonline.com
ai-testing.maventa.com
aiassistant.stage.vismaonline.com
api.workbox.dk
app.workbox.dk
authz.workbox.dk
autointerface.stag.visma.net
ax-stage.maventa.com
com.visma.blue
connect.identity.stagaws.visma.com
eaccounting.stage.vismaonline.com
eaccountingprinting.stage.vismaonline.com
identity.stage.vismaonline.com
myservices-api.stage.vismaonline.com
myservices.stage.vismaonline.com
oauth.developers.stagaws.visma.com
photoservice.stage.vismaonline.com
testing.maventa.com