Banner object (1)

Hack and Take the Cash !

684 bounties in database


500 $ 

Internet Freedom (IBB)

The Internet Bug Bounty is offering rewards to security researchers who resolve critical vulnerabilities in core software that has a direct impact on Internet Freedom. Critical vulnerabilities in these scopes have widespread consequences to the internet community. Please review the scope section below on which scopes qualify for this program!

Bounty Qualification

  • Only Critical vulnerabilities that demonstrate unambiguous remote code execution are eligible under this program. Findings with alternative impact or severity are not in scope at this time.
  • Your Proof of Concept MUST demonstrate that remote exploitation can be easily, actively, and reliably achieved.
  • Only versions currently supported by the upstream project are eligible. Please verify your issue is present in a current release before submission.
  • The individual software maintainers have final decision on which issues constitute security vulnerabilities. The Panel will respect their decision, and we ask that you do as well. It's important to keep in mind that not all submissions will qualify for a bounty, and that the decision to award a bounty is entirely at the discretion of the Panel.

Submission Process

  • Disclose a previously unknown security vulnerability directly to the project maintainers. Findings that are privately disclosed to other parties or bounty programs before the project maintainers are not eligible.
  • Follow the disclosure process established by the project maintainers.
  • Clearly demonstrate the security vulnerability. Respect the time of the project volunteers as they cannot invest significant effort into incomplete reports. Low-quality reports may be disqualified.
  • Once a public security advisory has been issued, please submit a report here. You must not send us the details of the vulnerability until it has been validated, accepted, and publicly disclosed by the project maintainers.

If you believe there are other widely used technologies in which a vulnerability would have a widespread impact on Internet freedom (e.g. digital rights and access), please email with your suggestion(s).

Hall of Fame

List your Bug Bounty for free immediately!

Contact us if you want more information.

FireBounty (c) 2015-2018