# Security Policy ## Supported Versions | Version | Supported | | ------- | ------------------ | | 0.6.x | :white_check_mark: | | 0.5.x | :x: | | 0.4.x | :x: | | 0.3.x | :x: | | 0.2.x | :x: | | 0.1.x | :x: | ## Reporting Vulnerabilities FOSSBilling accepts vulnerability reports directly through GitHub, to open a new one simply [click here](https://github.com/FOSSBilling/FOSSBilling/security/advisories/new). If you are looking for existing advisories, those can be found [here on GitHub](https://github.com/FOSSBilling/FOSSBilling/security/advisories). If you have a bug or a suggestion that is not related to an exploit, it should be reported [via a new issue](https://github.com/FOSSBilling/FOSSBilling/issues/new/choose). (But please check if someone has already submitted it first!) A well-written vulnerability report should include the following information: - Identification of the file(s) affected by the exploit - Description of how the vulnerability can be exploited - Potential ramifications of the vulnerability - A proof of concept exploit (if possible) - Insights into a possible solution ### Non-Qualifying Vulnerabilities Reports covering any of the following topics will be rejected by the FOSSBilling team: - Reports from automated tools or scanners. - Theoretical attacks without proof of exploitability. - Attacks that are the result of a third party library should be reported to the library maintainers. - Social engineering. - Reflected file download. - Physical attacks. - Weak SSL/TLS/SSH algorithms or protocols. - Attacks involving physical access to a user’s device, or involving a device or network that’s already seriously compromised (eg man-in-the-middle). - The user attacks themselves. - Anything in `/tests-legacy` or `tests`.