[WordPress Security] A $10,000 Reminder for Security Researchers

From: Wordfence <list_at_wordfence.com>
Date: Wed, 6 Dec 2023 12:55:41 -0800

These payouts are quite possibly the highest bug bounties in the history of WordPress.

Wordfence-Logo.png (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW-rMX6RDfDSW1l8V-_92f26zW2K0rfL56Lvl1N7Wbryn3prCCW6N1vHY6lZ3ljN9cvV2QlX1n_W8918m_2w0zjfW99JLgt5T2KVdW8QDRP16XWFVSW6S2qtN4q287BW5Q4Glr4D_bcjW1wtR9z2jC1F5W7pWbLs2TDhrfW7JVtLm3s-dn_W1Z4MrB3MHwv5W6wDYdx4n1vH4N87Ftgvsk13SW1mzzxP7Whz34VgfYmr1LhqqjW8b6zr925N3fzW7t-KFN5QqX_PW6pCVbF1R8gkrW6g0qv25qRp_MVykSSZ8Vd8ngW3l9KSK2h0PtYN2PkNhXgwK7TW2zGcJG4YK147f4krj9F04 )

FeaturedImage_Wordfence_55.02.03 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW-rMX6RDfDSW1l8V-_92f26zW2K0rfL56Lvl1N7Wbryn5m_5PW6N1X8z6lZ3nyW8Zzdkv4pwyKHW1GgXf44frpl8W9klCzl82LR-fW7S8TYQ5-PjdHW3DmwF81-59KQW90HYDq4cqDQZN52HTJWTM8nhW6r1QvP65_tRTW3Bb56x2F8cYCW3SW80v30lSQ5W5kSC2h6t6BDpW5Ymps745f9YKW7DtNcm75Y9NlW3jvs1V3CMkG3W2_0Hxj4dJ1RSW5tZqD47-fqjDW8xxsP63SQyBLW1wG58w5krp90N7y80z1cL0JMW3TBcbw4MjGkFW43bxJ25FjZslN40Xk3BltyJ-VPrBJ370fx92W17f9s93bXLWFW62qtVw8mMDj_W6-9mmC3N2Cb4N764bBz85_QjW7y3_sv5K-wYSW1CkTDV5Jj18jW6SHKxZ2JDnmjW5wR-ym5V3BsjW8_6CDv4v-vShW7tlH7L8h_vpKW4P5vqh6Dz7qwW3kKzYq7kG_hrW29bfSW7ZZjcqW46W14w1JZjbVVBJ_QD83R88Xf6dwdNF04 )

Just a quick update and reminder that we’re paying up to $10,000 for WordPress vulnerability reports until December 20th, 2023 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW-rMX6RDfDSW1l8V-_92f26zW2K0rfL56Lvl1N7Wbryn5m_5PW6N1X8z6lZ3nyW8Zzdkv4pwyKHW1GgXf44frpl8W9klCzl82LR-fW7S8TYQ5-PjdHW3DmwF81-59KQW90HYDq4cqDQZN52HTJWTM8nhW6r1QvP65_tRTW3Bb56x2F8cYCW3SW80v30lSQ5W5kSC2h6t6BDpW5Ymps745f9YKW7DtNcm75Y9NlW3jvs1V3CMkG3W2_0Hxj4dJ1RSW5tZqD47-fqjDW8xxsP63SQyBLW1wG58w5krp90N7y80z1cL0JMW3TBcbw4MjGkFW43bxJ25FjZslN40Xk3BltyJ-VPrBJ370fx92W17f9s93bXLWFW62qtVw8mMDj_W6-9mmC3N2Cb4N764bBz85_QjW7y3_sv5K-wYSW1CkTDV5Jj18jW6SHKxZ2JDnmjW5wR-ym5V3BsjW8_6CDv4v-vShW7tlH7L8h_vpKW4P5vqh6Dz7qwW3kKzYq7kG_hrW29bfSW7ZZjcqW46W14w1JZjbVVBJ_QD83R88Xf6dwdNF04 ) . So if you are a security researcher, you have another two weeks to submit your vulnerabilities for consideration and earn yourself a nice holiday bonus!

These payouts are quite possibly the highest bug bounties in the history of WordPress. We’re hoping to pay out at least a combined $100,000 during the 20-day promo, and I’m hoping we can far exceed that goal.

Remember, this isn't some leaderboard-based system or gamification of security research. Wordfence pays all researchers the same rates for their work. We don't believe in asking security researchers to work for free.

Updates on payouts:

- We're already at over $6000 in projected payouts since Dec 1st (past 6 days) and rapidly climbing - and that only includes bounties already triaged.
- The highest bounty in the past 6 days is $2,750
- Over 60 new researchers have joined us in the past 6 days
- We've had 30 new vulnerabilities reported in just the past 48 hours, so the volume we're seeing is increasing.
- We expect these numbers to continue to rapidly climb as researchers who recently joined have time to work.

Our goal with this initiative is simple: We are paying to fund WordPress security research, and then giving that research back to the community, for free.

As with all vulnerabilities reported to Wordfence, we ensure they are responsibly disclosed to vendors in a timely manner, and the research is then published via our free vulnerability database, including via our completely free API to help secure the WordPress community as a whole.

You can find out more on the official announcement post which is here… (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW-rMX6RDfDSW1l8V-_92f26zW2K0rfL56Lvl1N7Wbryn5m_5PW6N1X8z6lZ3nyW8Zzdkv4pwyKHW1GgXf44frpl8W9klCzl82LR-fW7S8TYQ5-PjdHW3DmwF81-59KQW90HYDq4cqDQZN52HTJWTM8nhW6r1QvP65_tRTW3Bb56x2F8cYCW3SW80v30lSQ5W5kSC2h6t6BDpW5Ymps745f9YKW7DtNcm75Y9NlW3jvs1V3CMkG3W2_0Hxj4dJ1RSW5tZqD47-fqjDW8xxsP63SQyBLW1wG58w5krp90N7y80z1cL0JMW3TBcbw4MjGkFW43bxJ25FjZslN40Xk3BltyJ-VPrBJ370fx92W17f9s93bXLWFW62qtVw8mMDj_W6-9mmC3N2Cb4N764bBz85_QjW7y3_sv5K-wYSW1CkTDV5Jj18jW6SHKxZ2JDnmjW5wR-ym5V3BsjW8_6CDv4v-vShW7tlH7L8h_vpKW4P5vqh6Dz7qwW3kKzYq7kG_hrW29bfSW7ZZjcqW46W14w1JZjbVVBJ_QD83R88Xf6dwdNF04 )

CONTINUE READING ON THE BLOG
(https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW-rMX6RDfDSW1l8V-_92f26zW2K0rfL56Lvl1N7Wbryn5m_5PW6N1X8z6lZ3nyW8Zzdkv4pwyKHW1GgXf44frpl8W9klCzl82LR-fW7S8TYQ5-PjdHW3DmwF81-59KQW90HYDq4cqDQZN52HTJWTM8nhW6r1QvP65_tRTW3Bb56x2F8cYCW3SW80v30lSQ5W5kSC2h6t6BDpW5Ymps745f9YKW7DtNcm75Y9NlW3jvs1V3CMkG3W2_0Hxj4dJ1RSW5tZqD47-fqjDW8xxsP63SQyBLW1wG58w5krp90N7y80z1cL0JMW3TBcbw4MjGkFW43bxJ25FjZslN40Xk3BltyJ-VPrBJ370fx92W17f9s93bXLWFW62qtVw8mMDj_W6-9mmC3N2Cb4N764bBz85_QjW7y3_sv5K-wYSW1CkTDV5Jj18jW6SHKxZ2JDnmjW5wR-ym5V3BsjW8_6CDv4v-vShW7tlH7L8h_vpKW4P5vqh6Dz7qwW3kKzYq7kG_hrW29bfSW7ZZjcqW46W14w1JZjbVVBJ_QD83R88Xf6dwdNF04 )

Here are the details:

It’s the season of giving, and at Wordfence we are all about giving! That’s why we have decided to run a Holiday Bug Extravaganza from today through December 20th, 2023. All researchers will earn 6.25x our normal bounty reward rates for any eligible vulnerabilities submitted as part of the Wordfence Bug Bounty Program. This means researchers can earn up to $10,000 for individual vulnerabilities reported to us in WordPress software that is in-scope for our program.

Get started by signing up as a researcher and submitting a vulnerability today!

REGISTER AS A RESEARCHER
(https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW-rMX6RDfDSW1l8V-_92f26zW2K0rfL56Lvl1N7Wbry-3prCCW7Y8-PT6lZ3nYW3r7djf3wnYYbW73Z7rW87ySpqN8hMqQ0Nnmq-W53jQPj8yWPvQW8M-WRn83_xyMW3xXJX240lT5QW5SWWtF5CgXXHW7BNfGF3BtH8xW97Q_dG5hBXlfW8hjpxp1g-KtwW7Y0ySW6c4GvNW8F7ZGN6dCGSQW1F98CK2tCtymW49J8483TmBzpW2JMJ4P4_GnLvW4TDZbx48tQvYVhWjfW4mVsXgW4z_cmB4sgWvDW332SX_7LQx68Vl5nYC60C9bXW62_9kk5-tLf3W2pbCmt7SmSDTN5_fXvzf36ZzW60JN351yBZCnW7NXKd75mJkZXW6y-MNy2HNwrCf6KC8bH04 )

SUBMIT A VULNERABILITY
(https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW-rMX6RDfDSW1l8V-_92f26zW2K0rfL56Lvl1N7Wbry-3prCCW7Y8-PT6lZ3lfW75TLsn3Zq0mgW6KfmyT5DvZ16W9dnmLf8Dr78YVQZLDc1qCb-vW8_TwT_2pKsT8W9bK8cK6ZQm0hW78fDB53qkjF7W3Mg0rf2TF5TqW3Pr6Vd4HRqkbW1_4XkM1rJYmTW6zGLPs13DB_ZVMWp6V5YF36BW12YjFg6_qC2bW5H4B7y89JYVzW8FxND83h7vzMW81ZSQL8nGGN-W4gLycn4L0yC-W1Qwtnj9kk6LxW2JrMw94B0LFxW99s8VX4xYnbXW5ZZXsc123FT_W6gCCkF4q4HSfW4jvNl68NpWGVW5RtL_f8WJHMhN8WJvpX37_1VW5-VdHL6P58Z2f27c1cl04 )

Please note that we have one additional requirement for this extravaganza: Given the high payouts, we require that Wordfence handle the responsible disclosure process for vulnerabilities submitted during the extravaganza, instead of the researcher interacting with the vendor directly. Most researchers prefer this approach and ask us to handle responsible disclosure, because having Wordfence reach out tends to get a faster response. We’ve made this a requirement for the extravaganza so that we can directly work with vendors to validate vulnerabilities. There will be no delay in disclosure and no delay in adding vulnerabilities to our database, workload permitting.

Examples of Bounty Rewards You Can Earn with the current Holiday Extravaganza Bonus:

- $1,600 $10,000 for an Unauthenticated Remote Code Execution, Arbitrary File Upload, Privilege Escalation to Admin, Arbitrary Options Update, or Authentication Bypass to Admin in a plugin/theme with 1,000,000+ installs.

- $1,200 $7,500 if the plugin/theme is within the 500,000 – 999,999 active install count range
- $600 $3,750 if the plugin/theme is within the 100,000 – 499,999 active install count range
- $400 $2,625 if the plugin/theme is within the 50,000 – 99,999 active install count range
- All bounty rewards decrease as authentication requirements increase, and may decrease if the vulnerability is highly complex to exploit or the impact is limited (i.e. non-default setting required).

- $800 $5,000 for an Unauthenticated SQL Injection or Local File Include in a plugin/theme with 1,000,000+ installs.

- $600 $3,650 if the plugin/theme is within the 500,000 – 999,999 active install count range
- $300 $1,875 if the plugin/theme is within the 100,000 – 499,999 active install count range
- $200 $1,250 if the plugin/theme is within the 50,000 – 99,999 active install count range
- All bounty rewards decrease as authentication requirements increase, and may decrease if the vulnerability is highly complex to exploit or the impact is limited (i.e. non-default setting required).

- $320 $2,000 for an Unauthenticated Stored Cross-Site Scripting, Missing Authorization, PHP Object Injection (w/no useable gadget), Information Disclosure, or Server-Side Request Forgery vulnerability in a plugin/theme with 1,000,000+ Installs

- $240 $1,500 if the plugin/theme is within the 500,000 – 999,999 active install count range
- $120 $750 if the plugin/theme is within the 100,000 – 499,999 active install count range
- $80 $500 if the plugin/theme is within the 50,000 – 99,999 active install count range
- All bounty rewards decrease as authentication requirements increase, and may decrease if the vulnerability is highly complex to exploit or the impact is limited (i.e. non-default setting required).

- $80 $500 for an Reflected Cross-Site Scripting or Cross-Site Request Forgery vulnerability in a plugin/theme with 1,000,000+ Installs

- $60 $375 if the plugin/theme is within the 500,000 – 999,999 active install count range
- $30 $187.50 if the plugin/theme is within the 100,000 – 499,999 active install count range
- $20 $125 if the plugin/theme is within the 50,000 – 99,999 active install count range
- All bounty rewards are based a required user interaction component & no authentication, and may decrease if the vulnerability is highly complex to exploit or the impact is limited (i.e. non-default setting required)

How to Participate in the Wordfence Holiday Bug Extravaganza:

- Review our Reward Payout Schedule (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW-rMX6RDfDSW1l8V-_92f26zW2K0rfL56Lvl1N7Wbrzg3prCCW8wLKSR6lZ3ndW1gHcvq7K8jj9W4kCsJV8zNZbsW2ch3WW1DW1whN2RCp9Jxr7sZW4FgrC62DQlTtN6DxfNLQfgPBW1fHpfd1tWmXhV-180T8bVqGSW4mC596585cqvW1SqVQX2ggHZYW6Hv3Pk1kJd2JW70Xq_-4PVDbzV3xpLq8D89T7W4PCFjD2yh_jbW4l0std2rz8CFW1M9q0D7BnlR4W30NGph1PxRmnW7WkcPC3n5PM3W1lKlZG7SMNv1V3nty57MD24CW3g5L8r1yxf39W5196jv92wy5zW29tsZD4wvdnsN96sxLV1mGMdW7lDXR16J5cHHW8SHgJt6hJBwPW7MPkbD2LQjlVVVpYNv2g7crBf1bvMZT04 ) here (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW-rMX6RDfDSW1l8V-_92f26zW2K0rfL56Lvl1N7Wbrzg3prCCW8wLKSR6lZ3ndW1gHcvq7K8jj9W4kCsJV8zNZbsW2ch3WW1DW1whN2RCp9Jxr7sZW4FgrC62DQlTtN6DxfNLQfgPBW1fHpfd1tWmXhV-180T8bVqGSW4mC596585cqvW1SqVQX2ggHZYW6Hv3Pk1kJd2JW70Xq_-4PVDbzV3xpLq8D89T7W4PCFjD2yh_jbW4l0std2rz8CFW1M9q0D7BnlR4W30NGph1PxRmnW7WkcPC3n5PM3W1lKlZG7SMNv1V3nty57MD24CW3g5L8r1yxf39W5196jv92wy5zW29tsZD4wvdnsN96sxLV1mGMdW7lDXR16J5cHHW8SHgJt6hJBwPW7MPkbD2LQjlVVVpYNv2g7crBf1bvMZT04 ) , along with our terms and conditions (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW-rMX6RDfDSW1l8V-_92f26zW2K0rfL56Lvl1N7Wbrzg3prCCW8wLKSR6lZ3pXN1j2KvPwqsB-W1QbV1X7cdwLFVD05gp1JQrkNW1Y6Kk83K7y0gW8qzyZd3WXlnsW8_kVRm384bFGW4dDZ6q5Y1K6VW44gnBY6cpddQN6mq5Kj-yQdMW1wWN6m3LPZsXW8q6zK43khjhlW3GBn6L6DqkzlW7n7lGk8gVTzvW4LCFrl6nBK7cW6NHfG474Q1KPW2G_lSD47q-81W4Tj56m1sNZqSW1BMHxr55NXj1W6clBKP8Jq6zlW69MPZz8Y1Nq4W15Z3bK82HlNwW11SZMP740B5JV_5XF043f9FBW97GsGT6NSBlMW4fTzBx1RLDbJW7vkBkM6k0g68W3V8hsp31z0R5W6gtV9C7KZdprf7zr5Rx04 ) .
- Register as a researcher (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW-rMX6RDfDSW1l8V-_92f26zW2K0rfL56Lvl1N7Wbry-3prCCW7Y8-PT6lZ3nYW3r7djf3wnYYbW73Z7rW87ySpqN8hMqQ0Nnmq-W53jQPj8yWPvQW8M-WRn83_xyMW3xXJX240lT5QW5SWWtF5CgXXHW7BNfGF3BtH8xW97Q_dG5hBXlfW8hjpxp1g-KtwW7Y0ySW6c4GvNW8F7ZGN6dCGSQW1F98CK2tCtymW49J8483TmBzpW2JMJ4P4_GnLvW4TDZbx48tQvYVhWjfW4mVsXgW4z_cmB4sgWvDW332SX_7LQx68Vl5nYC60C9bXW62_9kk5-tLf3W2pbCmt7SmSDTN5_fXvzf36ZzW60JN351yBZCnW7NXKd75mJkZXW6y-MNy2HNwrCf6KC8bH04 ) . Please note all profiles are moderated within 72 hours (typically much faster), but you can submit your first vulnerability while waiting for profile approval.
- Submit your vulnerability (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW-rMX6RDfDSW1l8V-_92f26zW2K0rfL56Lvl1N7Wbry-3prCCW7Y8-PT6lZ3lfW75TLsn3Zq0mgW6KfmyT5DvZ16W9dnmLf8Dr78YVQZLDc1qCb-vW8_TwT_2pKsT8W9bK8cK6ZQm0hW78fDB53qkjF7W3Mg0rf2TF5TqW3Pr6Vd4HRqkbW1_4XkM1rJYmTW6zGLPs13DB_ZVMWp6V5YF36BW12YjFg6_qC2bW5H4B7y89JYVzW8FxND83h7vzMW81ZSQL8nGGN-W4gLycn4L0yC-W1Qwtnj9kk6LxW2JrMw94B0LFxW99s8VX4xYnbXW5ZZXsc123FT_W6gCCkF4q4HSfW4jvNl68NpWGVW5RtL_f8WJHMhN8WJvpX37_1VW5-VdHL6P58Z2f27c1cl04 ) using the vulnerability submission form whenever you are ready.
- Kick back, relax, and enjoy that cup of peppermint hot cocoa (or beverage of choice) ☕, while the Wordfence team validates the report, awards you a bounty, and works with the developer to ensure it gets patched.

Please share and forward this with your friends so everyone can take advantage of this incredible extravaganza!

The Full Product Lineup

wf-stacked-free-1 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW-rMX6RDfDSW1l8V-_92f26zW2K0rfL56Lvl1N7Wbry-3prCCW7Y8-PT6lZ3kTW7J7z8l4tnK73W3L-xyR61l95hW7q-1Mr10Hl8vW6DXK811TZkTZN6LxRqCm76fNN7hdXXX3Fm45W1FB71z5Jk1-4W567Hfk5pp2rgN910MpMq5GbLN8HL1mGXTX_KN24CXhszZc5FW2SpfS68_W1t9N96LNklB2_2rW4BPQh37sF4BPW8p8fSh39B5m8W34mWqF6CJbJPW30t0865ppqqyW3Ckr_B1v1c8qW22BLwX8pT-ldN7fFsTyVn9cSW1HdvnP7Y3TFBW8nGnTp87VPy_W8SBkmf8X2qL1W1gr51q1Bq2vFW5K6fHd52lzTBW38h1-M5BRygnf6LRZFs04 )

wf-stacked-premium-1 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW-rMX6RDfDSW1l8V-_92f26zW2K0rfL56Lvl1N7Wbry-3prCCW7Y8-PT6lZ3q3W8LkCls3hSRrBW820gXl3gr1QyVqH6Zq43gwxtW2bNzsy8s_HLHW6N9_qJ4__jPCW6JVqx65J0xqBN2QbQT33fdLhW1ys8lN4Nc9d9W14Vzvt910_CTW8R4WDG66MyrYW10YCjv2_Z046W5zZ65q25lv2rW50-7HR6ry0NVW1dmKqG5Xg7mrW3GhKkY2WZC_jV2ghWc5jf5xsW7dHl_J1qh_hYW2MkwQ67X8JGnW4vtLX22FJ6BnW4hMpC07G1h8ZW2QB38S9l1lSqW3Jz11M7x2mTSW7lSQ398Bszv2W2Y-b7T1Z0tCXW4Rdr5n99sjl2W4PL8pr6drHVcf1H7MDF04 )

wf-stacked-care-3 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW-rMX6RDfDSW1l8V-_92f26zW2K0rfL56Lvl1N7Wbry-3prCCW7Y8-PT6lZ3n5W51vs114zh5_jW2MbgBd6slZB1V5T7tB3nl8tXW6xJQ7m2GQ7LPW5kTDsC1ftzcZW3p9kHv8BjCNmN4Xh-gV1XBWMW2Rg-pr7ncPc3W5hCZGT22YCPZW8sCMjW3X82sVMDCwbzF4T4VW11cM1n45NX8zVMgD0D8vSPVwV3f8sf45HHjVN69QWxy3Gj41W2rt9gV502xkCN1zRJp0qBnHzW4DZGml8fZ12hW4zfRDS5vYNW5V2vBh896ry5YW7nV8Kz92XVlsW7cHDJn5n7LFzW1ktGP_3mjZDJW60kG_d7Ft0NDW3L79hM7gWFxRW68j9l53MC7NHf1cBjfb04 )

wf-stacked-response-2 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW-rMX6RDfDSW1l8V-_92f26zW2K0rfL56Lvl1N7Wbry-3prCCW7Y8-PT6lZ3nkVk5CZy5_n0MgN4ZG08Pv7zLNW8TgqM12mGwnlW1xBX3847W5D9W2mBKdX6GvqXQW5qR-Mh1_28BtW3n-f013Yq4lwW8q4qxN8yfh6_W4XTMnJ7Yby7zW8Rtjxc4lnJy2W3ss85B87vFHcW1rdPtv57_FqqW34-cPP8tGKP_W4g5BB06_6bznW7bRhB-2MzfQXV4kSrk1r2wTRW88FjdL15t04QVNJvmD5qbx_RW7bzQSZ1VJLVgW1TKnDP45jz0qW6F06qb2NC38JW88T6yY6YTWmSW4Dfd2_8SKM-sW2Tp2_H97V3CNW336jLW7RfBx4W4L5y1N8CDxdgf3jWxjj04 )

wf-stacked-cli (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW-rMX6RDfDSW1l8V-_92f26zW2K0rfL56Lvl1N7Wbry-3prCCW7Y8-PT6lZ3kwW5RZBGc8J_0cgW3cT7Jf7K_DtwVNcP304xghWQW9gC_-n3bcV3JVSff7M56PGdBW8QCtwz93qf_NW5BFVx43Tkbl-W65QMDd4_JkJYW4zVCJ04dzLFhW103vHM3_KQ7XN2pcjZ8GTyMNW5w9trf8XPCCHW57NN_13DNv65W2h9G4S3rkzK_W7r6zbH2QSzGcVYG0TW8nKqqtW7z9RXP6H-9j3W8tQQTP8lvPVYW2Fc_cZ995ZS8MNSLMSnGHNSW8DfxDK5zSYZ9W3-RkC634mkVSVDjW488KJVQjW84T37V43DBVzVB55-s5BV2PQVSjTh17SRyYjdMhZWd04 )

wf-stacked-intelligence (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW-rMX6RDfDSW1l8V-_92f26zW2K0rfL56Lvl1N7WbryH3prCCW7lCdLW6lZ3n3W74X_dG9hfXNsW1016Fz6XT47hW4KkJ9r5yz2lQW3Rw4qy45dQZmW3Dnp4Y8jX6lbW6Bthb36FrGbYW6trVtR6GThvkW2PZBDK6zD7vRVHxTJg87TtKvW5y_c5B6xk3jDW9jVXsb1DGRzrW22MX2x2gKV6sW1TZmct60PQgRW2v_szg3Txw-hW92fpy88RcrflW7DghF_3y6phJW6YF29h1pt6D-W5JygZ16mlPTdW6r17kg4Cn9sQW470hmW91kkZwW5lFG8H2_nY1zW2Qjs9k2JbdR6W1hvTVM4B06bhW80Xcr47sh8y-f1n3hsR04 )

logo-defiant (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW-rMX6RDfDSW1l8V-_92f26zW2K0rfL56Lvl1N7Wbryn3prCCW6N1vHY6lZ3nvVHN1yD48g-CZW3Kvcsh25NPp9W1QBRqc1z519XW2ChtRD38xfsRW5b_1rT4jVGNjW4fhY331lxmfxW8gpLWq9k59rxW2QzWQR1_K9cjW67ML3n8tF5pqN8hWsn3kn3jgW2-sm294-8-jQW8bl9rW7rMRT-W8Jx_zH193g-MW8ydpnC4NNYnxW36w3XV6tbZ9kW74sWf34GF-D6W71CcfP39fN6HN38GFSbvl3MYW8W6WK92xqXkkV3MvVJ2sSgY3W8sHhJ36bZ3HrW88ZXw87wjvlHf8p9T8W04 )

Defiant, Inc., 1700 Westlake Ave N STE 200

Seattle, WA 98109 United States

Unsubscribe (https://email.wordfence.com/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=Vn9bTK892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3XmWFfnW7b2wD56-MMNfV25tyH6vnBCwN5Sx9-_X1k5yN4XWTPTXk_7QVbw0rb8GDQzZW2qK-hd91FL_5w4LBQMw3y72&v=3&_hsenc=p2ANqtz-8JKzqlEr2bGeupXkpFr5N48j4obiv2WaUWAJBmrZPLQeXMnmYB6aE6XwIq6RmncGx6eC5WuUS5eRNKpnwtkrZ2BUFz3w&_hsmi=285506795 ) Manage Preferences (https://email.wordfence.com/hs/manage-preferences/unsubscribe?languagePreference=en&d=Vn9bTK892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3XmWFfnW7b2wD56-MMNfV25tyH6vnBCwN5Sx9-_X1k5yN4XWTPTXk_7QVbw0rb8GDQzZW2qK-hd91FL_5w4LBQMw3y72&v=3&_hsenc=p2ANqtz-8JKzqlEr2bGeupXkpFr5N48j4obiv2WaUWAJBmrZPLQeXMnmYB6aE6XwIq6RmncGx6eC5WuUS5eRNKpnwtkrZ2BUFz3w&_hsmi=285506795 )

ISO_27001 (https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VW-rMX6RDfDSW1l8V-_92f26zW2K0rfL56Lvl1N7Wbryn3prCCW6N1vHY6lZ3kwW5L3bRT5H3HWsN3FpzJJFBTfTW5Hd9xH8YSYgqW4PKGz87q4KmmW3G7tb_8rwZ3QW2124qR8nkPhzW2B2LzG403kfQW7GbnZg2F3yNPN23y7HgPdfnHW82CNZH21zl4YW267yTT4dCc_vVtmtjG9chsF6W7fb1PB3X9X_QW7-7pPx69kDbSW2hRVLk60S05-W7BX9wf2WTrCmW5p0yFW8LT_D-W5v9WH08G9Q88W2kv8fV8L0jSrW6JkX_D6k0QqFW4BG-DK6Z2HY-W6FVDQd2HCBQYf3cD1w204 )

You're receiving this email because you signed up to the Wordfence WordPress security mailing list.
Received on Wed Dec 06 2023 - 21:55:43 CET

This archive was generated by hypermail 2.3.0 : Wed Dec 06 2023 - 22:03:36 CET