![Bug Bounty Hunting Essentials](https://wfqqreader-1252317822.image.myqcloud.com/cover/130/36699130/b_36699130.jpg)
上QQ阅读APP看书,第一时间看更新
Writing exploitability of a report
You, as a researcher, need to show the team how likely it is that this vulnerability can pose a significant threat and describe its possible impact. If the exploitation of the vulnerability that you have identified is easy and straightforward, it may be rewarded with a relatively higher bounty but, however, the opposite is also true. If the report contains at least one real-world attack scenario showing that the vulnerability poses a significant threat, the report's value increases.
![](https://epubservercos.yuewen.com/60369C/19470384508840006/epubprivate/OEBPS/Images/693d3797-18e9-4005-b47b-e1c0390a561f.png?sign=1739204889-k4djgYCYuNHa3gezlbel8tmpOHCAUSou-0-50b625978a32a1fa38b1a4affa8d159d)
This is an example showing the exploitability of a report.