Bảng giá
Dịch vụ
Hosting
Managed Hosting cho WordPress
Hỗ trợ bởi AI
Tối ưu hóa hosting cho CMS phổ biến nhất thế giới
Managed Hosting cho WooCommerce
Xây dựng và phát triển trang web thương mại điện tử
Web hosting
Hosting bảo mật, tốc độ, đáng tin cậy cho trang web
Cloud hosting
Đưa doanh nghiệp lên tầm cao mới với nhiều tài nguyên hơn
Đại lý hosting
Được thiết kế dành cho các chuyên gia và đại lý
Trang web
Website Builder
Hỗ trợ bởi AI
Tạo trang hoặc website bán hàng trong 3 bước dễ dàng
eCommerce Website Builder
Hỗ trợ bởi AI
Đi thẳng vào kinh doanh với website bán hàng
Horizons
Hỗ trợ bởi AI
Xây dựng trang web hoặc ứng dụng web tùy chỉnh không cần mã trong vài phút
VPS
VPS hosting
Nhận máy chủ mạnh mẽ dựa trên KVM
Tên miền
Tìm kiếm tên miền
Hỗ trợ bởi AI
Tìm và đăng ký địa chỉ trang web
Chuyển tên miền
Bạn đã có tên miền? Chuyển nó sang Hostinger.
Email
Email doanh nghiệp
Xây dựng thương hiệu với địa chỉ email chuyên nghiệp
Google Workspace
Chuyển đổi làm việc nhóm và tăng năng suất
Di chuyển trang web
Di chuyển trang web từ nơi khác, nhanh chóng và miễn phí
Khám phá
Blog
Tin tức và cập nhật mới nhất của chúng tôi
Tính năng và công cụ
Các tính năng và bản phát hành sản phẩm mới nhất
Câu chuyện của chúng tôi
Chúng ta đến đây như thế nào và chúng ta sẽ đi đâu
Làm thế nào để tạo trang web
Câu chuyện của khách hàng
Thành công của khách hàng là câu chuyện yêu thích của chúng tôi
Hỗ trợ
Kiến thức cơ bản
Lời khuyên và câu trả lời cho tất cả câu hỏi thường gặp
Hướng dẫn
Video và bài viết để giúp bạn đạt được thành công trực tuyến
Liên hệ
Cách liên hệ chúng tôi
Làm thế nào để tạo trang web
Làm thế nào để tạo trang web
Hướng dẫn từng bước để xây dựng và ra mắt trang web
Horizons
VN
Tiếng Việt
Quay lạiChọn quốc gia của bạn
AR
Argentina
Español
BR
Brasil
Português
CO
Colombia
Español
CZ
Česko
Čeština
DK
Danmark
Dansk
DE
Deutschland
Deutsch
EE
Eesti
Eesti
GR
Ελλάδα
Ελληνικά
ES
España
Español
FR
France
Français
HR
Hrvatska
Hrvatski
IN
India
English
IN
भारत
हिंदी
ID
Indonesia
Bahasa Indonesia
IT
Italia
Italiano
JP
Japan
日本語
LV
Latvija
Latviešu
LT
Lietuva
Lietuvių
HU
Magyarország
Magyar
MY
Malaysia
English
MX
México
Español
NL
Nederland
Nederlands
NO
Norge
Norsk
PK
Pakistan
English
PH
Philippines
English
PL
Polska
Polski
PT
Portugal
Português
RO
Română
România
SK
Slovensko
Slovenčina
FI
Suomi
Suomi
SE
Sverige
Svenska
TR
Türkiye
Türkçe
UA
Україна
Українська
GB
United Kingdom
English
US
United States
English
VN
Việt Nam
Tiếng Việt
AE
الدول العربية
العربية
IL
יִשְׂרָאֵל
עברית
TH
ประเทศไทย
ไทย
KR
대한민국
한국어
CN
中国
中文
Đăng nhập

Chính sách công khai thông tin và Chương trình Bug Reward của Hostinger

Vui lòng đọc kỹ thỏa thuận này vì nó chứa các thông tin quan trọng liên quan đến quyền lợi và biện pháp khắc phục của bạn.

Chính sách Bảo mật
Điều khoản Dịch vụ
Thông tin Registrar

Thỏa thuận

Điều khoản đặc biệt của Hostinger Horizons
Phụ lục xử lý dữ liệu
Thỏa thuận Chương trình Affiliate
Thỏa thuận Chương trình Giới thiệu
Thỏa thuận chuyển tên miền
Thỏa thuận đăng ký tên miền
Thỏa thuận đổi Chủ đăng ký
Thỏa thuận Hosting

Chính sách

Chính sách công khai thông tin và Chương trình Bug Reward của Hostinger
Chính sách Cookie
Chính sách Hoàn tiền
Chính sách khôi phục đăng ký hết hạn
Chính sách Nhà đăng ký TLD
Chính sách xử lý vi phạm
Giải quyết tranh chấp tên miền
Hướng dẫn và quyền hạn thương hiệu
Thương hiệu/Bản quyền

Chính sách của công ty

Quy tắc ứng xử của bên thứ ba

Phiên bản tiếng Anh của chính sách và thỏa thuận pháp lý này được xem là phiên bản hiện hành và có giá trị pháp lý duy nhất. Tất cả phiên bản được dịch chỉ dùng cho mục đích tham khảo và để hiểu rõ phiên bản tiếng Anh hơn. Các phiên bản được dịch không có ràng buộc pháp lý và không thể thay thế phiên bản tiếng Anh. Trong trường hợp có mâu thuẫn hoặc bất đồng, điều khoản dịch vụ bằng tiếng Anh sẽ được ưu tiên và là ràng buộc duy nhất.

Chính sách Bảo mậtĐiều khoản Dịch vụThông tin RegistrarThỏa thuậnĐiều khoản đặc biệt của Hostinger HorizonsPhụ lục xử lý dữ liệuThỏa thuận Chương trình AffiliateThỏa thuận Chương trình Giới thiệuThỏa thuận chuyển tên miềnThỏa thuận đăng ký tên miềnThỏa thuận đổi Chủ đăng kýThỏa thuận HostingChính sáchChính sách công khai thông tin và Chương trình Bug Reward của HostingerChính sách CookieChính sách Hoàn tiềnChính sách khôi phục đăng ký hết hạnChính sách Nhà đăng ký TLDChính sách xử lý vi phạmGiải quyết tranh chấp tên miềnHướng dẫn và quyền hạn thương hiệuThương hiệu/Bản quyềnChính sách của công tyQuy tắc ứng xử của bên thứ ba
Chính sách Bảo mậtĐiều khoản Dịch vụThông tin RegistrarThỏa thuậnĐiều khoản đặc biệt của Hostinger HorizonsPhụ lục xử lý dữ liệuThỏa thuận Chương trình AffiliateThỏa thuận Chương trình Giới thiệuThỏa thuận chuyển tên miềnThỏa thuận đăng ký tên miềnThỏa thuận đổi Chủ đăng kýThỏa thuận HostingChính sáchChính sách công khai thông tin và Chương trình Bug Reward của HostingerChính sách CookieChính sách Hoàn tiềnChính sách khôi phục đăng ký hết hạnChính sách Nhà đăng ký TLDChính sách xử lý vi phạmGiải quyết tranh chấp tên miềnHướng dẫn và quyền hạn thương hiệuThương hiệu/Bản quyềnChính sách của công tyQuy tắc ứng xử của bên thứ ba

Lần chỉnh sửa cuối: 2025-05-07 07:40:33

RESPONSIBLE DISCLOSURE POLICY

Hostinger encourages the responsible disclosure of security vulnerabilities in our services or on our website. In order to facilitate the responsible disclosure of security vulnerabilities, we agree that if, in our sole discretion, we conclude that a disclosure meets all of the guidelines of the Hostinger Bug Bounty Reward Program, Hostinger will not bring any private or criminal legal action against the disclosing party.

BUG BOUNTY REWARD PROGRAM POLICY AND TERMS

Our team of dedicated security professionals works vigilantly to help keep customer information secure. We recognize the important role that security researchers and our user community play in helping to keep Hostinger and our customers secure. If you discover a site’s or product’s vulnerability please notify us using the guidelines below.

PROGRAM TERMS

Please note that your participation in the Bug Bounty Reward Program (“Bug Bounty Program”) is voluntary and subject to the terms and conditions set forth on this page (“Program Terms”). By submitting a site or product vulnerability to Hostinger you acknowledge that you have read and agreed to these Program Terms.

These Program Terms supplement the Terms of Service and Privacy Policy and any other agreement in which you have entered with Hostinger. The terms of those Hostinger agreements will apply to your use of, and participation in, the Bug Bounty Program as if fully set forth herein. If any inconsistency exists between the Terms of Service, Privacy Policy and these Program Terms, these Program Terms will prevail, but only with regard to the Bug Bounty Program.

To encourage responsible disclosures, Hostinger commits that, if we conclude, in our sole discretion, that a disclosure respects and meets all the guidelines of these Program Terms, Privacy Policy and Terms of Service, Hostinger will not bring a private action against you or refer a matter for public inquiry.

As part of your research, you shall not modify any files or data, including permissions, and shall not intentionally view or access any data beyond what is needed to prove the vulnerability.

Hostinger will make a best effort to adhere to the following response targets:

Type of ResponseBusiness days
First Response2 working days
Time to Triage5 working days
Time to Bounty14 working days
Time to Resolutiondepends on severity and complexity

TESTING CREDENTIALS

In order to avoid abuse of shared credentials for testing they will not be provided. Bug Bounty Program participants will need to register a new account and order a single shared hosting plan by themselves. We will provide discount coupons for our Bug Bounty Program participants which will cover all expenses of a single shared hosting plan for one month. Participants interested in testing Hostinger web applications should reach out to the security team at security@hostinger.com asking to claim a free discount coupon. Please don't forget to include your Hackerone profile name, email used for Hostinger account registration and short notice that you're participating in a Bug Bounty Program through Hackerone and we will send you a coupon code which will cover all expenses of a single shared hosting plan for one month.

THE FOLLOWING HOSTINGER DOMAINS IN SCOPE:

  • www.hostinger.com
  • hpanel.hostinger.com
  • cpanel.hostinger.com
  • payments.hostinger.com
  • builder.hostinger.com
  • www.niagahoster.co.id
  • horizons.hostinger.com

Domains not listed above are not in scope.

Note: we only reward vulnerabilities caused by our systems. Issues related to the cPanel platform itself are not eligible for rewards.

NEW HOSTING PLAN - AGENCY

We have launched new Agency hosting plans that are built entirely on our H5G infrastructure, which is designed specifically for WordPress hosting. These plans provide complete site isolation to boost security and performance. They also facilitate access sharing for each site, supporting smooth collaboration among team members.

Since the Agency plan is fully powered by H5G, its security testing scope (including Bounty Payments) falls under our existing H5G Infrastructure scope. We invite researchers to help identify potential vulnerabilities.

To participate in testing our new hosting plans, please email security@hostinger.com and ask for a coupon for Agency plan testing. Include the email address you used to register for Hpanel in your email.

ELIGIBILITY REQUIREMENTS

To be eligible for the Bug Bounty Program, you must not:

  • Be in violation of any national, state, or local law or regulation;
  • Be employed by Hostinger or its affiliates;
  • Be an immediate family member of a person employed by Hostinger or its affiliates; or
  • Be less than 16 years of age. If you are at least 16 years old, but are considered a minor in your place of residence, you must get your parent’s or legal guardian’s permission prior to participating in the Bug Bounty Program.

If Hostinger discovers that you meet any of the criteria above, Hostinger will remove you from the Bug Bounty Program and disqualify you from receiving any Bounty Payments.

DISCLOSURE GUIDELINES

By providing a submission through HackerOne or agreeing to the Program Terms, you agree that you shall not publicly disclose your findings or the contents of your Submission to any third parties in any way without Hostinger's prior written approval.

Failure to comply with the Program Terms will result in immediate disqualification from the Bug Bounty Program and ineligibility for receiving any Bounty Payments.

QUALIFYING VULNERABILITIES:

Hostinger will accept a report of any vulnerability that substantially affects the confidentiality or integrity of any eligible Hostinger service. Eligible vulnerabilities include, but are not limited to:

  • Authentication or authorization flaws, including insecure direct object references and authentication bypass
  • Server-side or remote code execution (RCE)
  • Injection vulnerabilities, including SQL and XML injection
  • Directory Traversal
  • Privilege Escalation
  • Disclosure of sensitive or personally identifiable information
  • Significant security misconfiguration with a verifiable vulnerability
  • Exposed system credentials, disclosed by Hostinger or its employees, that pose a valid risk to an in scope asset

NON-QUALIFYING VULNERABILITIES:

Any domain not listed in policy scope is out of scope for the purposes of the Bug Bounty Program, as is all hosted customer content and third-party programs and plug-ins.

The following actions do not qualify for the Bug Bounty Program and should not be tested by researchers participating in the Bug Bounty Program:

  • Reports that involve a secondary user account where an existing business relationship is being leveraged and the impact is limited solely to the parent account
  • Username enumeration on customer facing systems (i.e. using server responses to determine whether a given account exists)
  • Scanner output or scanner-generated reports, including any automated or active exploit tool
  • Man-in-the-Middle attacks
  • Any physical attacks against Hostinger property or data centers
  • Cross Site Scripting (XSS)
  • Cross Site Request Forgery (CSRF)
  • Click-jacking
  • Vulnerabilities involving stolen credentials or physical access to a device
  • Phishing attacks
  • Social engineering attacks, including those targeting or impersonating internal employees by any means (e.g., customer service chat features, social media, personal domains, etc.)
  • Open redirection, except in the following circumstances:
    • Clicking a Hostinger-owned URL immediately results in an unexpected redirection and loss of sensitive data (e.g., session tokens, PII, etc)
  • CRIME/BEAST attacks
  • Logout CSRF
  • Banner or version disclosures
  • Missing SPF records
  • Directory listing (unless sensitive data can be found)
  • DoS, brute force, user enumeration or DDoS attacks
  • Blackhat SEO techniques
  • Any other submission determined to be low risk, based on unlikely or theoretical attack vectors, requiring significant user interaction, or resulting in minimal impact
  • Vulnerabilities on third party libraries without showing specific impact to the target application (e.g., a CVE with no exploit)
  • Exposed credentials that are either no longer valid, or do not pose a risk to an in scope asset
  • Any bug that relies upon an outdated browser
  • Infrastructure vulnerabilities, including:
    • Issues related to SSL certificates
    • DNS configuration issues
    • Server configuration issues (e.g., open ports, TLS versions, etc.)
  • Bugs requiring exceedingly unlikely user interaction.
  • Insecure password complexity requirements
  • Email verification/validation issues
  • Quality and business logic bugs which do not pose real risk and do not impact business and customers in a way which could lead to unauthorised access to data or systems, also when there is no possibility to take advantage of the bug to cause some sort of damage to company systems or data.
  • Vulnerabilities on individual clients infrastructure or virtual private servers (VPS), including websites, databases, etc.
  • Hacking discount coupons
  • Broken links 

BUG SUBMISSIONS REQUIREMENTS

For all submissions, please include following information:

  • Full description of the vulnerability being reported, including the exploitability and impact
  • Evidence and explanation of all steps required to reproduce the submission, which may include:
  • Videos or Step by step screenshots
  • Exploit code
  • Traffic logs
  • Web/API requests and responses
  • Email address or user ID of any test accounts
  • IP address used during testing
  • For RCE submissions, see below

Failure to include any of the above items may delay or jeopardize the Bounty Payment

REMOTE CODE EXECUTION (RCE) SUBMISSIONS GUIDELINES:

Failure to meet the below conditions and requirements could result in a forfeiture of any potential Bounty Payment:

  • Source IP address
  • Timestamp, including time zone
  • Full server request and responses
  • Filenames of any uploaded files, which must include “bugbounty” and the timestamp
  • Callback IP and port, if applicable
  • Any data that was accessed, either deliberately or inadvertently

Allowed Actions:

  • Directly injecting benign commands via the web application or interface (e.g. whoami, hostname, ifconfig)
  • Uploading a file that outputs the result of a hard-coded benign command

Prohibited Actions:

  • Uploading files that allow arbitrary commands (i.e. a webshell)
  • Modifying any files or data, including permissions
  • Deleting any files or data
  • Interrupting normal operations (e.g. triggering a reboot)
  • Creating and maintaining a persistent connection to the server
  • Intentionally viewing any files or data beyond what is needed to prove the vulnerability
  • Failing to disclose any actions taken or applicable required information

BOUNTY PAYMENTS

You may be eligible to receive a monetary reward (“Bounty Payment”) if: (i) you are the first person to submit a site or product vulnerability; (ii) that vulnerability is determined to by a valid security issue by Hostinger's security team at their sole discretion; and (iii) you have complied with all Program Terms.

Bounty Payments, if any, will be determined by Hostinger, in Hostinger sole discretion. In no event shall Hostinger be obligated to pay you a bounty for any Submission. All Bounty Payments shall be considered gratuitous.

All Bounty Payments will be made in United States dollars (USD). You will be responsible for any tax implications related to Bounty Payments you receive, as determined by the laws of your jurisdiction of residence or citizenship.

Hostinger will determine all Bounty Payments based on the risk and impact of the vulnerability. The minimum bounty amount for a validated bug submission is $100USD and the maximum bounty for a validated bug submission is $25000USD.

Hostinger security team  retains the right to determine if the bug submitted to the Bug Bounty Program is eligible. All determinations as to the amount of a bounty made by the Hostinger Bug Bounty Team are final. Bounty Payment ranges are based on the classification and sensitivity of the data impacted, ease of exploit and overall risk to Hostinger customers, Hostinger brand and determined to be a valid security issue by Hostinger's security team.

RETESTING

Please note that we reserve the right to request or decline retesting of reported issues at our discretion, based on our internal assessment and priorities. Our decision will take into account factors such as the severity of the issue, the quality of the initial report, and our current resource availability. 

To recognize the additional effort involved in retesting, we offer retest bounties as follows: 

  • Low and Medium Severity Issues: $50 USD;
  • High and Critical-Severity Issues: $100 USD.

OWNERSHIP OF SUBMISSIONS

As a condition of participation in the Bug Bounty Program, you hereby grant Hostinger, its  and affiliates a perpetual, irrevocable, worldwide, royalty-free, transferrable, sublicensable (through multiple tiers) and non-exclusive license to use, reproduce, adapt, modify, publish, distribute, publicly perform, create derivative work from, make, use, sell, offer for sale and import the Submission, as well as any materials submitted to Hostinger in connection therewith, for any purpose. You should not send us any Submission that you do not wish to license to us.

You hereby represent and warrant that the Submission is original to you and you own all right, title and interest in and to the Submission. Further, you hereby waive all other claims of any nature, including express contract, implied-in-fact contract, or quasi-contract, arising out of any disclosure of the Submission to Hostinger. In no event shall Hostinger be precluded from discussing, reviewing, developing for itself, having developed, or developing for third parties, materials which are competitive with those set forth in the Submission irrespective of their similarity to the information in the Submission, so long as Hostinger complies with the terms of participation stated herein.

TERMINATION

In the event (i) you breach any of these Program Terms or the Terms of Service of the Hostinger; or (ii) Hostinger determines, in its sole discretion that your continued participation in the Bug Bounty Program could adversely impact Hostinger (including, but not limited to, presenting any threat to Hostinger's systems, security, finances and/or reputation) Hostinger may immediately terminate your participation in the Bug Bounty Program and disqualify you from receiving any Bounty Payments. Please follow these Program Terms. 

CONFIDENTIALITY

Any information you receive or collect about Hostinger, Hostinger employees or any Hostinger customer through the Bug Bounty Program (“Confidential Information”) must be kept confidential and only used in connection with the Bug Bounty Program. You shall not use, disclose or distribute any such Confidential Information, including, but not limited to, any information regarding your Submission and information you obtain when researching the Hostinger sites, without Hostinger's prior written consent. Any disclosure of Confidential Information outside of this requirement will result in immediate removal from the Bug Bounty Program.

INDEMNIFICATION

In addition to any indemnification obligations you may have under the Terms of Service, you agree to defend, indemnify and hold Hostinger, its affiliates and the officers, directors, agents, employees and suppliers of Hostinger, harmless from any claim or demand (including attorneys’ fees) made or incurred by any third party due to or arising out of your Submissions, your breach of these Program Terms and/or your improper use of the Bug Bounty Program.

CHANGES TO PROGRAM TERMS

The Bug Bounty Program, including its policies, is subject to change or cancellation by Hostinger at any time, without notice. As such, Hostinger may amend these Program Terms and/or its policies at any time by posting a revised version on our website. By continuing to participate in the Bug Bounty Program after Hostinger posts any such changes, you accept the Program Terms, as modified.

 

Submit
hostingWeb hosting Hosting cho WordPress VPS hosting Email doanh nghiệp Cloud hosting WooCommerce hosting Hosting cho đại lý Minecraft hosting Google Workspace
Tên miềnTìm kiếm tên miền Tên miền giá rẻ Tên Miền Miễn Phí WHOIS SSL Miễn Phí Chuyển Tên Miền Tên miền
công cụHorizons Website Builder AI Website Builder eCommerce Website Builder Trình tạo Logo AI Chuyển website Hostinger API
thông tinBảng Giá Đánh Giá Chương Trình Affiliate Lộ trình Trang Phần Thưởng Tình Trạng Hệ Thống Sơ đồ trang
công tyVề Hostinger Công nghệ của chúng tôi Blog (Tiếng Anh)
Hỗ trợHướng Dẫn (Tiếng Anh) Kiến thức cơ bản Liên Hệ Báo Cáo Vi Phạm
Chính Sách Bảo Mật Chính sách hoàn tiền Điều Khoản Dịch Vụ
visa
mastercard
amex
discover
jcb
maestro
dinersclub
thêm nữa
© 2004-2025 Hostinger - Web Hosting cao cấp, Cloud, VPS & Dịch vụ đăng ký tên miền.

Giá được liệt kê chưa VAT