Which Bug Bounty Program part establishes expectations for behavior while participating in a bug bounty program?
Code of Conduct
WRITING A GOOD REPORT
Which base metric value of the base score considers that attackers can only exploit a vulnerability if they reside in the same physical or logical network as the target host/application?