![Bug Bounty Hunting Essentials](https://wfqqreader-1252317822.image.myqcloud.com/cover/130/36699130/b_36699130.jpg)
上QQ阅读APP看书,第一时间看更新
Writing exploitability of a report
You, as a researcher, need to show the team how likely it is that this vulnerability can pose a significant threat and describe its possible impact. If the exploitation of the vulnerability that you have identified is easy and straightforward, it may be rewarded with a relatively higher bounty but, however, the opposite is also true. If the report contains at least one real-world attack scenario showing that the vulnerability poses a significant threat, the report's value increases.
![](https://epubservercos.yuewen.com/60369C/19470384508840006/epubprivate/OEBPS/Images/693d3797-18e9-4005-b47b-e1c0390a561f.png?sign=1738855014-EKCfrttUXFMYU2oHTf8ovoOyEyLxJ8ey-0-6c040705741844decc00b2e9f5728acd)
This is an example showing the exploitability of a report.