Ministry of Regional Development of the Czech Republic Public Bug Bounty Program

@mmr

mmr.gov.cz

Launched on
5/31/2025
Testing period
Continuous
All Bounties Reports: 30
€ 4800.00
Last report
7/16/2025 2:29:52 PM
Scope
In Scope
Name Type Bounty Tier
*.mmr.gov.cz WILDCARD Tier 1
*.mmr.cz WILDCARD Tier 1
*.uzemniplanovani.gov.cz WILDCARD Tier 1
*.stavebnisprava.gov.cz WILDCARD Tier 1
*.mssf.cz WILDCARD Tier 1
*.nipez.cz WILDCARD Tier 1
*.cevd.gov.cz WILDCARD Tier 1
adfs14.mssf.cz WEB Tier 1
adfs14-node11.mssf.cz WEB Tier 1
adfs14-node12.mssf.cz WEB Tier 1
adfs14-ref.mssf.cz WEB Tier 1
adfs14-test.mssf.cz WEB Tier 1
adfs21.mssf.cz WEB Tier 1
adfs21_node1.mssf.cz WEB Tier 1
adfs21_node2.mssf.cz WEB Tier 1
adfs21-test.mssf.cz WEB Tier 1
adfs.nipez.cz WEB Tier 1
admin.vvz.nipez.cz WEB Tier 1
ais.stavebnisprava.gov.cz WEB Tier 1
ais.uzemniplanovani.gov.cz WEB Tier 1
apao21-test.mssf.cz WEB Tier 1
apao-test.mssf.cz WEB Tier 1
api.ais.stavebnisprava.gov.cz WEB Tier 1
api.dud.stavebnisprava.gov.cz WEB Tier 1
api.eaos.stavebnisprava.gov.cz WEB Tier 1
api.ics.stavebnisprava.gov.cz WEB Tier 1
api.ko.stavebnisprava.gov.cz WEB Tier 1
api.kud.stavebnisprava.gov.cz WEB Tier 1
api.kud.uzemniplanovani.gov.cz WEB Tier 1
api.portal.stavebnisprava.gov.cz WEB Tier 1
api.tidi.stavebnisprava.gov.cz WEB Tier 1
api.uzemniplanovani.gov.cz WEB Tier 1
api.vvz.nipez.cz WEB Tier 1
attch.portal.stavebnisprava.gov.cz WEB Tier 1
autodiscover.mmr.cz WEB Tier 1
autodiscover.mmr.gov.cz WEB Tier 1
b2b.stavebnisprava.gov.cz WEB Tier 1
benefit7.mssf.cz WEB Tier 1
bia.mssf.cz WEB Tier 1
bia-test.mssf.cz WEB Tier 1
bip21.mssf.cz WEB Tier 1
bip21-test.mssf.cz WEB Tier 1
bip.mssf.cz WEB Tier 1
cdz.vvz.nipez.cz WEB Tier 1
ciselnik.nipez.cz WEB Tier 1
ciselniky.nipez.cz WEB Tier 1
ck.mmr.cz WEB Tier 1
cms.uzemniplanovani.gov.cz WEB Tier 1
cms.vvz.nipez.cz WEB Tier 1
cognos-nipez.mssf.cz WEB Tier 1
crr.mssf.cz WEB Tier 1
cssf21-dms.mssf.cz WEB Tier 1
cssf21-dms-ref.mssf.cz WEB Tier 1
cssf21-dms-test.mssf.cz WEB Tier 1
cssf21.mssf.cz WEB Tier 1
cssf21-ref.mssf.cz WEB Tier 1
cssf21-test.mssf.cz WEB Tier 1
czpres-en.mmr.cz WEB Tier 1
czpres.mmr.cz WEB Tier 1
data.mmr.cz WEB Tier 1
denodo-nipez.mssf.cz WEB Tier 1
developers.stavebnisprava.gov.cz WEB Tier 1
dis-ext2.mmr.cz WEB Tier 1
dmseu.mssf.cz WEB Tier 1
dmsiu.mssf.cz WEB Tier 1
dmssd.mssf.cz WEB Tier 1
dotaceeu.cz WEB Tier 1
drazby.mmr.cz WEB Tier 1
dud.stavebnisprava.gov.cz WEB Tier 1
dv21-nipez.mssf.cz WEB Tier 1
eaos.stavebnisprava.gov.cz WEB Tier 1
esb21.mssf.cz WEB Tier 1
esb21-test.mssf.cz WEB Tier 1
esbecko.mssf.cz WEB Tier 1
esb-test-ws-ssl.mssf.cz WEB Tier 1
esb-ws-ssl.mssf.cz WEB Tier 1
eu4u.dotaceeu.cz WEB Tier 1
eud.mmr.cz WEB Tier 1
eu-zadost.cz WEB Tier 1
fw01.mmr.cz WEB Tier 1
fw01s.mmr.cz WEB Tier 1
gitlab.stavebnisprava.gov.cz WEB Tier 1
gitlab.uzemniplanovani.gov.cz WEB Tier 1
gw-gts.mmr.cz WEB Tier 1
hews.mmr.cz WEB Tier 1
hsmtp.mmr.cz WEB Tier 1
id.developers.stavebnisprava.gov.cz WEB Tier 1
infocentrum.mmr.cz WEB Tier 1
irop.gov.cz WEB Tier 1
irop.mmr.cz WEB Tier 1
iskp21-dms.mssf.cz WEB Tier 1
iskp21-dms-ref.mssf.cz WEB Tier 1
iskp21-dms-test.mssf.cz WEB Tier 1
iskp21.mssf.cz WEB Tier 1
iskp21-ref.mssf.cz WEB Tier 1
iskp21-test.mssf.cz WEB Tier 1
isvz.nipez.cz WEB Tier 1
kud.stavebnisprava.gov.cz WEB Tier 1
kud.uzemniplanovani.gov.cz WEB Tier 1
mail.ms2014.mssf.cz WEB Tier 1
mails.mmr.cz WEB Tier 1
mail-zal.ms2014.mssf.cz WEB Tier 1
mapy.mmr.cz WEB Tier 1
mdm.mmr.cz WEB Tier 1
mis.mssf.cz WEB Tier 1
mmr.cz WEB Tier 1
mmr.gov.cz WEB Tier 1
mmr.mssf.cz WEB Tier 1
mon1p.nipez.cz WEB Tier 1
moodle.mssf.cz WEB Tier 1
moodle-test.mssf.cz WEB Tier 1
ms14-esb.mssf.cz WEB Tier 1
ms14-esb-test.mssf.cz WEB Tier 1
ms14-ns2.mssf.cz WEB Tier 1
ms14-ns.mssf.cz WEB Tier 1
ms14-ns-sandbox.mssf.cz WEB Tier 1
ms14-ns-test.mssf.cz WEB Tier 1
ms14opendata.mssf.cz WEB Tier 1
ms14-prod.mssf.cz WEB Tier 1
ms14-prod-prim.mssf.cz WEB Tier 1
ms14-prod-zal.mssf.cz WEB Tier 1
ms14xsd.mssf.cz WEB Tier 1
ms14xsd-sandbox.mssf.cz WEB Tier 1
ms21_1.mssf.cz WEB Tier 1
ms21_2.mssf.cz WEB Tier 1
ms21opendata.mssf.cz WEB Tier 1
ms21-prod.mssf.cz WEB Tier 1
ms21-prod-prim.mssf.cz WEB Tier 1
ms21-prod-zal.mssf.cz WEB Tier 1
ms21xsd.mssf.cz WEB Tier 1
mseu-dms-test.mssf.cz WEB Tier 1
mseu.mssf.cz WEB Tier 1
mseu-sandbox.mssf.cz WEB Tier 1
mseu-test.mssf.cz WEB Tier 1
msiu-dms-test.mssf.cz WEB Tier 1
msiu.mssf.cz WEB Tier 1
msiu-sandbox.mssf.cz WEB Tier 1
msiu-test.mssf.cz WEB Tier 1
msiu-zal.mssf.cz WEB Tier 1
mssf.cz WEB Tier 1
nd.vvz.nipez.cz WEB Tier 1
nen-dev.nipez.cz WEB Tier 1
nen-elearning.nipez.cz WEB Tier 1
nen.nipez.cz WEB Tier 1
nen-ref.nipez.cz WEB Tier 1
nen-temp.nipez.cz WEB Tier 1
nen-test.nipez.cz WEB Tier 1
nen-ws.nipez.cz WEB Tier 1
nipez.cz WEB Tier 1
nip.mmr.cz WEB Tier 1
ns1.mssf.cz WEB Tier 1
ns2.mssf.cz WEB Tier 1
old.risy.cz WEB Tier 1
podpora.nipez.cz WEB Tier 1
podporovanebyty.mmr.cz WEB Tier 1
portalnen.nipez.cz WEB Tier 1
portal.stavebnisprava.gov.cz WEB Tier 1
portal-vz.cz WEB Tier 1
potencial.risy.cz WEB Tier 1
proxy.mmr.cz WEB Tier 1
psvzit.mmr.cz WEB Tier 1
publicita14-20.dotaceeu.cz WEB Tier 1
publicita.dotaceeu.cz WEB Tier 1
ref.admin.vvz.nipez.cz WEB Tier 1
ref.api.vvz.nipez.cz WEB Tier 1
ref.cdz.vvz.nipez.cz WEB Tier 1
ref.nd.vvz.nipez.cz WEB Tier 1
refundacepohrby.mmr.cz WEB Tier 1
ref.vvz.nipez.cz WEB Tier 1
repository.stavebnisprava.gov.cz WEB Tier 1
repository.uzemniplanovani.gov.cz WEB Tier 1
rezervace.mmr.cz WEB Tier 1
risy.cz WEB Tier 1
rozza.cz WEB Tier 1
sablony-msc2007.mssf.cz WEB Tier 1
sablony-mssf-central.mssf.cz WEB Tier 1
sd21-dms.mssf.cz WEB Tier 1
sd21-dms-ref.mssf.cz WEB Tier 1
sd21-dms-test.mssf.cz WEB Tier 1
sd21.mssf.cz WEB Tier 1
sd21-ref.mssf.cz WEB Tier 1
sd21-test.mssf.cz WEB Tier 1
sd-dms-test.mssf.cz WEB Tier 1
sd.mssf.cz WEB Tier 1
sd.nipez.cz WEB Tier 1
sd-sandbox.mssf.cz WEB Tier 1
sd.stavebnisprava.gov.cz WEB Tier 1
sd-test.mssf.cz WEB Tier 1
sdt.nipez.cz WEB Tier 1
sd.uzemniplanovani.gov.cz WEB Tier 1
sf-ei01-mmr.mssf.cz WEB Tier 1
sign.mmr.cz WEB Tier 1
skd.nipez.cz WEB Tier 1
smartcities.mmr.cz WEB Tier 1
stavebnisprava.gov.cz WEB Tier 1
strukturalni-fondy.cz WEB Tier 1
test-cognos-nipez.mssf.cz WEB Tier 1
test-denodo-nipez.mssf.cz WEB Tier 1
test-dv21-nipez.mssf.cz WEB Tier 1
test.rozza.cz WEB Tier 1
unix.mmr.cz WEB Tier 1
urbact.mmr.cz WEB Tier 1
uzemniplanovani.gov.cz WEB Tier 1
v4.dotaceeu.cz WEB Tier 1
v4.mmr.cz WEB Tier 1
vpn.mmr.cz WEB Tier 1
vsu.mmr.cz WEB Tier 1
vvz.nipez.cz WEB Tier 1
vzdelavani.stavebnisprava.gov.cz WEB Tier 1
web2.mmr.cz WEB Tier 1
web3.mmr.cz WEB Tier 1
wuag.mmr.cz WEB Tier 1
www00.mmr.cz WEB Tier 1
www3.mmr.cz WEB Tier 1
www.central.mssf.mmr.cz WEB Tier 1
www.mmr.cz WEB Tier 1
www.msc7.mmr.cz WEB Tier 1
www.mssf.cz WEB Tier 1
www.uzemniplanovani.gov.cz WEB Tier 1
www.v4.dotaceeu.cz WEB Tier 1
www.v4.mmr.cz WEB Tier 1
194.213.207.128 - 194.213.207.159 NETWORK Tier 1
62.168.30.64 - 62.168.30.95 NETWORK Tier 1
2001:af0:ffe7::/48 NETWORK Tier 1
About company

The Ministry of Regional Development of the Czech Republic is a part of the system of central government authorities of the Czech Republic in the fields delineated by relevant legal documents. It plays an important role within the State administration through the extent of its powers, competences and responsibility for the management of financial resources.

Program Rules

Program description

Welcome to Ministry of Regional Development's bug bounty program. We take the security of our users seriously. We believe that working with security researchers and white hackers is crucial in identifying weaknesses in any technology. If you believe you have discovered a potential security vulnerability in our products, please help us fix it as quickly as possible by reporting your findings to us.

General rules

  • Testing is only authorized on the targets listed as Testing scope.
  • Any domain/property/database/IP address of Ministry of Regional Development not listed in the Testing scope section is strictly out of scope.
  • Avoid privacy violations, destruction of data, and interruption or degradation of Ministry of Regional Development’s services.
  • Only interact with accounts you own.
  • Findings must be exact, and the Bug Bounty Reports must contain the steps to follow to reproduce the issue. Attachments such as screenshots or Proof of Concept Code are highly recommended.
  • Rewards or recognition will not be awarded if our security team cannot reproduce and verify a Finding.
  • You must be the first person to report a valid Finding ('duplicate' reports will not be rewarded).
  • The use of not allowed Third-Party Systems, Third-Party Software and/or automated scanners are prohibited.
  • Ministry of Regional Development requests that Bounty Hunters do not perform automated/scripted testing of web forms, especially "Contact Us" forms.
  • If you find the same Vulnerability several times, please report only one Finding. Multiple Vulnerabilities caused by one underlying issue will be awarded one bounty.
  • You must not be a former or current employee of Ministry of Regional Development or one of its subcontractors.

Out of scope issues

  • Hypothetical flaw or best practices without exploitable POC and concrete attack scenario
  • Reports from automated tools or scans
  • Un-reproducible issues
  • Use of a known-vulnerable library (without evidence of exploitability)
  • Brute force attacks
  • Sell/ransom user information taken from password reuse or other attacks
  • Social engineering attacks (including phishing)
  • Finding legacy credentials on our Github repositories (that are no longer in use or were never valid to begin with)
  • User enumeration attacks
  • Reports of insecure SSL/TLS ciphers (unless you have a working proof of concept)
  • Homograph Attack
  • Password and account recovery policies, such as reset link expiration or password complexity
  • Persistent login cookie weaknesses
  • Login, logout, unauthenticated or low-value CSRF Web Sites / Applications
  • Clickjacking on static website
  • Disclosure of known public files or directories
  • Errors thrown by web service (e.g. nginx) when the request were invalid / fuzzing
  • Extension manipulation without any evidence of vulnerability (Attachments)
  • Host injection, except if you can successfully forge a wrong URL or compromise something using it
  • HttpOnly and Secure cookie flags as well as other missing cookie flags
  • Missing security-related HTTP headers which do not lead directly to a vulnerability HTTPS configurations derivations from "state of the art" (such as HSTS settings, Secure flag for cookies, "weak" TLS ciphers, etc)
  • Lack of context on user interaction
  • Vulnerabilities affecting users of outdated or unpatched browsers and platforms
  • UI redressing
  • XSS attacks via POST requests or self XSS (unless you provide a PoC that show impact on other our customers)
  • XSS or XSRF that requires header injection,
  • Missing autocomplete attributes
  • Missing cookie flags
  • Massive automated actions on the platform through robots/crawling (except if it gathers sensitive information)
  • CORS configuration, except if you can show a way to exploit this vulnerability to compromise sensitive information
  • RTLO and related issues
  • Stack traces or path disclosure Application Servers / API
  • Content spoofing / text injection
  • Errors thrown by web service (e.g. nginx) when the request were invalid / fuzzing
  • Extension manipulation without any evidence of vulnerability (Attachments)
  • Host injection, except if you can successfully forge a wrong URL or compromise something using it
  • Missing security-related HTTP headers which do not lead directly to a vulnerability
  • Vulnerabilities affecting users of outdated or unpatched browsers and platforms
  • Stack traces or path disclosure
  • Presence of autocomplete attribute on web forms
  • Presence/absence of SPF/DMARC records Email
  • Concerns related to email domain authentication
  • Email configuration data
  • Invalid or missing SPF (Sender Policy Framework) records (Incomplete or missing SPF/DKIM/DMARC)
  • Reports of spam Others
  • Absence of rate-limiting
  • Any issues regarding single session features/management
  • Third-party provider's software vulnerabilities
  • Denial of service attacks
  • Information disclosure
  • Premium phone numbers attacks
  • Recently disclosed 0-day vulnerabilities
  • Software version disclosure
  • Technical information disclosure without impact

Incident Handling and Response

You, as Bounty Hunter must report any suspicious, unintentional or unwanted activities and security events you may find in the environment to [email protected].

Ministry of Regional Development reserves the right to terminate and/or suspend the Program or revoke any Bounty Hunter’s authorization if a security incident occurs in the environment.

Public Disclosure

Before disclosing an issue publicly, we require that you first request permission from us (using “[email protected]” email address). Ministry of Regional Development will process requests for public disclosure on a per report basis. Any Bounty Hunter found publicly disclosing reported vulnerabilities without Ministry of Regional Development’s written consent will be sanctioned.

Rewards

Ministry of Regional Development will determine, in its sole discretion, whether Reward will be awarded. Our Rewards are majorly Finding severity based. Therefore, we ask you to evaluate a Vulnerability's impact carefully. Vulnerability severity shall be determined by using the MITRE CAPEC method (https://capec.mitre.org/).

You will not receive a reward, or your finding submission might be rejected if:

  • Reports about theoretical damage.
  • Out of date software without proven exploitable risks.
  • Attacks requiring unrealistic user interaction.
  • All reports without proof-of-concept (POC).
  • All reports without proven security impact.

Failure to comply with Program Rules can be sanctioned by the exclusion from the Bug Bounty Program or, even worse (legal actions against you). Failure to comply with applicable laws and the scope of permission may result in criminal prosecution.

Bounty Table
Critical High Medium Low
Tier 1 € 1000 € 500 € 0 € 0
Tier 2 € 0 € 0 € 0 € 0
Hackrate

Our platform helps companies to identify software vulnerabilities in a cost-efficient way. It provides a secure and centralized view of ethical hacking projects for your company.

US Patent Applied for HackGATE #63/645,845

Checking service status...

Capterra G2 Rating

Hackrate Ethical Hacking Platform |
2025 ©