Hack and Take the Cash !

717 / 717 bounties in database
30/01/2018

Reward

100 $

Showmax


No technology is perfect, and Showmax believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our product or service, we encour(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
30/01/2018

Crowdstrike


Policy

CrowdStrike encourages researchers to follow responsible disclosure procedures when reporting security issues in our products, services, websites, or infrastructure. CrowdStrike is committed to engaging with the research community in(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
30/01/2018

OCCRP


Rules

Organized Crime and Corruption Reporting Project (OCCRP; https://www.occrp.org/) is an investigative reporting platform formed by 24 non-profit investigative centers, scores of journalists and several major regional news organizatio(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
18/12/2017

Reward

50 $

SEMrush


Policy

No technology is perfect, and SEMrush believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our product or se(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
18/12/2017

AlienVault


Welcome to AlienNation. We're on a mission to provide organizations throughout the universe with highly intelligent security that is affordable and simple to use. To help out with our goals here at AlienVault, we look to our fellow security professio(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
18/12/2017

Reward

100 $

VLC


Policy

Appendix 1: Program Policy

Please note, this is the suggested starting policy language for the program. Based on responses from the community of bug hunters, changes may be made throughout the testing period. All changes(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
18/12/2017

RBKmoney


Policy

RBKmoney Vulnerability Disclosure Program policy

If you found a security vulnerability at any of RBKmoney services, let us know. We will review all legitimate reports and do our best to quickly fix the issue. Before report(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
18/12/2017

JohnBlackbourn


Policy

I maintain a number of popular open source WordPress plugins which deal with user authentication and sensitive information. I believe that the more eyes that software sees, the more secure it can be. If you believe you've found a se(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
18/12/2017

Deconf


Policy

Google Analytics Dashboard for WP (GADWP) is an open-source plugin for WordPress which connects Google Analytics with your website. You can find source code at https://github.com/deconf/Google-Analytics-Dashboard-for-WP.

Respo

(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
18/12/2017

Node.js third-party modules


Policy

No technology is perfect, and Node.js believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in a third-party Nod(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
27/10/2017

Reward

500 $

Data Processing (IBB)


Policy

The Internet Bug Bounty is offering rewards to security researchers who resolve critical vulnerabilities in core infrastructure data processing libraries. Critical vulnerabilities in these libraries have widespread consequences to(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
27/10/2017

Reward

25 $

Blockstack


Policy

Welcome Blockstack is building a new decentralized internet where users own their data and apps run without remote servers. We're rethinking DNS, identity, authentication, and application infrastructure and worki(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
27/10/2017

Aspen


Policy

No technology is perfect, and we believe that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in Aspen, we encourage yo(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
27/10/2017

bitwarden


Policy

bitwarden believes that working with security researchers across the globe is crucial to keeping our users safe. If you believe you've found a security issue in our product or service, we encourage you to notify us. We welcome work(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
27/10/2017

Reward

100 $

WINK


Policy

No technology is perfect, and WINK believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our product or serv(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
27/10/2017

Razer US


Policy

Razer looks forward to working with the security community to find security vulnerabilities in order to keep our businesses and customers safe. Razer will make a best effort to respond to incoming reports within 3 business days and(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
27/10/2017

Reward

Google Play Security Reward Program


Policy

Google Play is working with the independent bug bounty platform, HackerOne, and the developers of popular Android apps to implement the Google Play Security Reward Program. Developers of popular Android apps are invited to opt-in t(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
27/10/2017

Infogram


Policy

Responsible disclosure

To join the program you should read this whole page, and only proceed if you are OK with everything. If you disclose your findings responsibly, we will not bring any lawsuit against you or launch an(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
27/10/2017

Reward

Inflection


Policy

At Inflection, we're always looking for ways we can improve the security of our software. We know that no technology is perfect, and that's why we believe in working with the security community to find and squash vulnerabilities in(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
27/10/2017

Headspace


Policy

Headspace is participating in the Google Play Security Rewards Program. While we do not have a full disclosure program in place at this time, we are willing to accept reports that qualify for the Google Play Security Rewards Progra(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
27/10/2017

Duolingo


Policy

Duolingo is participating in the Google Play Security Rewards Program. While we do not have a full disclosure program in place at this time, we are willing to accept reports that qualify for the Google Play Security Rewards Program(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
21/09/2017

Reward

50 $

CCM Benchmark Group


CCM Benchmark Group

CCM Benchmark Group is a french online media. We run a network with more than 40 sites in 13 languages, about high-tech, news, health, economy and more. We have more than 50 millions of visitors monthly.

Even

(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
15/09/2017

Reward

100 $

Ercom


What is Cryptobox?

Cryptobox provides businesses and organizations with a sharing and collaboration solution to secure internal and external exchanges, using end-to-end encryption. You can securely access your documents fro

(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
11/09/2017

Reward

150 $

TTS Bug Bounty


TTS Bug Bounty

As part of its programmatic focus on security, the General Service Administration’s Technology Transformation Service (TTS) is pleased to welcome you to the first bug bounty program by a civilian federal agency. We look forw(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
11/09/2017

Monero


Scope

This primarily exists to help us find critical vulnerabilities in the Monero and Kovri applications, which are written in C++, with some C and assembly, and QtQuick for the Monero GUI. We are not terribly interested in website vulner(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
30/08/2017

Reward

Zoho


1.Provide details of the vulnerability including information needed to reproduce and validate the vulnerability and also provide a Proof of Concept (POC) 2.Make a good faith effort to avoid privacy violations, destruction of data and interruption or(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/07/2017

Weblate


Policy

No technology is perfect, and Weblate believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our product or s(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/07/2017

Reward

100 $

Mixmax


Policy

If you find a severe security vulnerability such that you can access or modify another Mixmax user's data, you'll be rewarded with a free Mixmax Professional account for a year ($288 value!) No technology is perfe(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/07/2017

Stellar.org


Policy

The Stellar Bug Bounty Program provides bounties for vulnerabilities and exploits discovered in the Stellar protocol or any of the code in our repos. We recognize the importance of our community and security researchers in helping(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/07/2017

Reward

130 $

Bumble


Policy

Bumble vulnerability disclosure program

We pay for all newfound vulnerabilities. Vulnerabilities will be ranked from category 5 (£1000) to category 1 (£100), depending on their severity. The Bumble jury determines the sev(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/07/2017

WakaTime


Policy

- wakatime.com - api.wakatime.com

Out of Scope Properties

- Olark "Need Help" floating chat (please do NOT post Olark chat messages) - Disqus blog comments (please do NOT post blog comments)

Out of Scope Vulnera

(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/07/2017

ICQ


Policy

We are launching a Bug Bounty program for ICQ, starting with covering most significant vulnerabilities as a first step. Therefore, at the first stage we invite the most experienced bug hunters and do not accept reports related to u(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/07/2017

Reward

25 $

Unikrn


Policy

Unikrn built the most technologically advanced sportsbook for esports. We run the best fully-regulated and licensed esports bookmaker on the planet. No technology is perfect, and Unikrn believes that working with skilled security re(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/07/2017

Reward

250 $

Bitvise


Policy

Bitvise wishes to motivate security researchers to look for and report security issues in Bitvise SSH Server and Client for Windows. A range of bounties are available, depending on the severity of the issue reported: * Cr(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/07/2017

Big Monocle


Big Monocle Bug Bounty Program

Big Monocle recognizes the importance of security researchers in helping keep our community safe. We encourage responsible disclosure of security vulnerabilities via our bug bounty program described on this p(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/07/2017

Reward

100 $

Tor


The Tor Project is committed to working with security experts across the world to stay up to date with the latest security techniques. If you have discovered a security issue that you believe we should know about, we'd welcome working with you. T(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/07/2017

delight.im


Policy

We believe that working with experienced security researchers across the globe is fundamental to identifying weaknesses in our technology and essential for keeping our products and our users safe. If you believe you've found a secu(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
28/07/2017

Reward

50 $

Grabtaxi Holdings Pte Ltd


Policy

Security is a top priority at Grab. We believe that no technology is perfect and that working with skilled security researchers across the globe is crucial in identifying weaknesses in our technology. If you believe you've found a s(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
30/06/2017

Reward

300 $

Patch Rewards


Patch Reward Program Rules

On October 9, 2013, we announced a new, experimental program that rewards proactive security improvements to select open-source projects. This effort complements and extends our long-running vulnerability reward(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
13/06/2017

Reward

OutScale


Introduction

Founded in 2010, strategic partner to Dassault Systèmes and CMSP Advanced certified by Cisco Systems, Outscale provides enterprise-class Cloud Computing services (IaaS) that meet regulatory and local requirements internally. O(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
26/05/2017

arxius


PLEASE DO NOT USE AUTOMATED TOOLS! يرجى عدم استخدام ادوات فحص آلية कृपया स्वचालित उपकरण का उपयोग नहीं करते! 请不要使用自动化的工具 ! 自動化ツールを使用しないでください ! Reports about spf, dmarc, and open ports will be closed as spam.. We've used all scanners that exist alread(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
26/05/2017

Reward

100 $

Dashlane


Coordinated Disclosure Guidelines

- Please let us know as soon as possible upon discovery of a potential security issue, and we’ll make every effort to quickly correct the issue. - Provide us a reasonable amount of time to respond and/o(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
26/05/2017

Teradici


No technology is perfect, and Teradici believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our product or service, we encou(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
26/05/2017

Reward

20 $

MapsMarker.com e.U.


PLEASE READ THE PROGRAM IN FULL DETAIL - ESPECIALLY THE TARGETS, NON TARGETS AND INVALID VULNERABILITIES SECTIONS! MAPSMARKER.COM/STORE/* IS ALSO A NON TARGET SO PLEASE DO NOT CREATE TEST USERS FOR THE CUSTOMER AREA! No technology is perfect, and we(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
26/05/2017

Cuvva


Cuvva is a new kind of insurance company - focussing on technology and customers first, finance second. Part of this is building all our systems entirely in-house, which - of course - can present new risks. Security is our highest priority and we(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
26/05/2017

Reward

25 $

Volusion V1


Being pro-active rather than re-active to emerging security issues is a fundamental belief at Volusion. Every day new security issues and attack vectors are created. Volusion strives to keep abreast on the latest state-of-the-art security developmen(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
26/05/2017

Reward

150 $

NETGEAR New


About NETGEAR Cash Reward Program

NETGEAR’s mission is to be the innovative leader in connecting the world to the internet. To achieve this mission, we must earn and maintain our customers’ trust by protecting the privacy and security of(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
20/04/2017

WordPress


WordPress.org is an open-source publishing platform: https://wordpress.org/. You can find source code at https://wordpress.org/download/source/. We also welcome reports for the open-source projects BuddyPress (https://buddypress.org/), bbPress (htt(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
20/04/2017

Homebrew


No technology is perfect, and Homebrew believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our product or service, we encou(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward
17/03/2017

Reward

50 $

Buildkite


Buildkite's first priority is keeping our customers data safe, and as such we're committed to working with security researchers across the globe to help us spot potential issues and vulnerabilities. Please review the following program rules before y(...)
Read More

 

Thanks
Gift
Hall of Fame
Reward


List your Bug Bounty for free immediately!

Contact us if you want more information.

FireBounty (c) 2016