![Bug Bounty Hunting Essentials](https://wfqqreader-1252317822.image.myqcloud.com/cover/130/36699130/b_36699130.jpg)
上QQ阅读APP看书,第一时间看更新
Writing exploitability of a report
You, as a researcher, need to show the team how likely it is that this vulnerability can pose a significant threat and describe its possible impact. If the exploitation of the vulnerability that you have identified is easy and straightforward, it may be rewarded with a relatively higher bounty but, however, the opposite is also true. If the report contains at least one real-world attack scenario showing that the vulnerability poses a significant threat, the report's value increases.
![](https://epubservercos.yuewen.com/60369C/19470384508840006/epubprivate/OEBPS/Images/693d3797-18e9-4005-b47b-e1c0390a561f.png?sign=1738853802-FyhGAkI8vseOHrKa2GEHvnpSd9xOzd4y-0-0fd769277b235420e0cde9e41b3821c5)
This is an example showing the exploitability of a report.