Banner object (1)

Hack and Take the Cash !

800 bounties in database

Latest Bug Bounty & Vulnerability disclosure programs

30/06/2015

redhat : Vulnerability Acknowledgements for Red Hat online services - Red Hat Customer Portal logo    redhat : Vulnerability Acknowledgements for Red Hat online services - Red Hat Customer Portal

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

reddit/SECURITY.md at master · reddit-archive/reddit · GitHub logo    reddit/SECURITY.md at master · reddit-archive/reddit · GitHub

GitHub is home to over 40 million developers working together to host and review code, manage projects, and build software together. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Relaso Enterprise Product Suite - Social CRM logo    Relaso Enterprise Product Suite - Social CRM

Vulnerability Reporting Policy The Relaso.com security team acknowledges the valuable role that independent security researchers play in Internet security. Keeping our customers' data secure is our number-one priority, and we encourage respon ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Bug Bounty Program : ReleaseWire Helpdesk logo    Bug Bounty Program : ReleaseWire Helpdesk

Modified on: Fri, Sep 23, 2016 at 12:15 PM ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Kwetsbaarheden melden - Rabobank logo    Kwetsbaarheden melden - Rabobank

...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Qualcomm Product Security | Qualcomm logo    Qualcomm Product Security | Qualcomm

We, Qualcomm Incorporated and its subsidiaries, understand that maintaining a large variety of products comes with certain responsibilities. Therefore, we take security vulnerabilities very seriously and always seek to respond appropriately. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Rackspace Security Vulnerability Reporting logo    Rackspace Security Vulnerability Reporting

We've designed our infrastructure and services for security, to protect our customers and their data. But if you discover a security vulnerability with any of our products, control panels, or other infrastructure, we want to know. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

recordedfuture : Report a Security Vulnerability | Recorded Future logo    recordedfuture : Report a Security Vulnerability | Recorded Future

Any vulnerability that could negatively impact confidential data discovered in a Recorded Future application, API, or content found on recordedfuture.com or any associated domains will be eligible for inclusion in the program. Any research or testing that might affect the availability, or degrade the performance, of Recorded Future’s services is strictly prohibited. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015
Reward
50 $ 

PureVPN logo    PureVPN

Experience Complete Online Security, Privacy and Anonymity. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Security | Puppet logo    Security | Puppet

Puppet supports ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

yp : The qmail security guarantee logo    yp : The qmail security guarantee

My offer still stands. Nobody has found any security holes in qmail. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Prezi Bug Bounty Program | Prezi logo    Prezi Bug Bounty Program | Prezi

At Prezi, we believe in harnessing the power of the security researcher community to help keep our users safe. This program is us encouraging the responsible disclosure of security vulnerabilities. Please check our Security Hall of Fame for a list of those who already helped us. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015
30/06/2015

wufoo : Wildbit Security Response logo    wufoo : Wildbit Security Response

Wufoo ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015
Reward

Pinterest logo    Pinterest

Discover ideas for any project or interest, hand-picked by people like you. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Pidgin, libpurple, and finch security and vulnerabilities logo    Pidgin, libpurple, and finch security and vulnerabilities

Being a network client which interacts with untrusted users and servers, managing vulnerabilities and security response is important to the Pidgin project and to our users. We have established procedures for collecting security-related information, and for disclosing this information to the public. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

PAYMILL Developer Centre logo    PAYMILL Developer Centre

Security is our number one priority! If you have any questions or concerns regarding security, please contact us at ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Panzura Security Policy – Panzura logo    Panzura Security Policy – Panzura

Panzura strives to develop products that our customers entrust with their most sensitive information; our goal is to ensure that our products meet the high standard for security our clients demand. This policy documents Panzura’s proactive commitment to identifying, mitigating, and resolving possible security vulnerabilities across our product line. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Online Payment Gateway in Australia | Paychoice logo    Online Payment Gateway in Australia | Paychoice

Start accepting all major credit cards, anytime, anywhere. Sometimes you need more options than just credit card payments. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015
Reward

Pantheon logo    Pantheon

Website development is complex. Hosting makes it harder. Top developers, marketers, and IT pros use Pantheon to build, launch, and run all their Drupal and WordPress sites. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

OV-chipkaart - Responsible disclosure logo    OV-chipkaart - Responsible disclosure

Je kunt problemen melden die te maken hebben met onze online dienstverlening of OV-chipkaart. Bijvoorbeeld: ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Responsible Disclosure | PagerDuty logo    Responsible Disclosure | PagerDuty

Westin St. Francis, San Francisco, CA ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Security Acknowledgements | OpenText logo    Security Acknowledgements | OpenText

OpenText reviews all reports of security vulnerabilities affecting OpenText products and services. To report a vulnerability in one of our products or solutions, please contact ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Policy - Opera Security Corner logo    Policy - Opera Security Corner

Opera is committed to your security, and we have a long and proven track record of fulfilling that commitment. Below, we take you through the process of how we handle security vulnerabilities when they are discovered and what steps we take to keep you, and others who are using our product, safe while online. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

How to Report Security Vulnerabilities to Oracle | Oracle logo    How to Report Security Vulnerabilities to Oracle | Oracle

Your search did not match any results. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

custhelp : Site Maintenance in progress logo    custhelp : Site Maintenance in progress

...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

OnePageCRM logo    OnePageCRM

Super easy online sales CRM for small business ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Security at Olark | Olark logo    Security at Olark | Olark

Olark uses cookies to give you the best possible experience on our website. By clicking "Continue", you agree to our use of cookies. Refer to our ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

OpenBSD: Security logo    OpenBSD: Security

For security advisories for specific releases, click below: ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

NolimitVPN logo    NolimitVPN

Anonymous and secure Internet access ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Nokia logo    Nokia

...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

nvidia : Product Security logo    nvidia : Product Security

NVIDIA takes security concerns seriously and works to quickly evaluate and address them. Once a security concern is reported, NVIDIA commits the appropriate resources to analyze, validate and provide corrective actions to address the issue. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

ncsc : Kwetsbaarheid melden (CVD) | Contact | Nationaal Cyber Security Centrum logo    ncsc : Kwetsbaarheid melden (CVD) | Contact | Nationaal Cyber Security Centrum

Vindt u een zwakke plek in een systeem van de overheid of in een systeem met een vitale functie? Dan is de gouden regel dat u eerst de eigenaar van het systeem benadert. Pas als de organisatie niet of niet goed reageert, kunt u het NCSC op de hoogte brengen. Wij nemen de rol van intermediair op ons om de kwetsbaarheid of zwakke plek te verhelpen. Het maken van zo'n melding heet Coordinated Vulnerability Disclosure (CVD). ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

netflix : Responsible Vulnerability Disclosure logo    netflix : Responsible Vulnerability Disclosure

Security researchers interested in reporting security vulnerabilities to the Netflix security team can do so via our Bug Bounty ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

How to Report Security Issues to NetApp | NetApp Product Security logo    How to Report Security Issues to NetApp | NetApp Product Security

The security of our products is of primary importance to NetApp and our customers. We accept reports of security vulnerabilities and work to ensure we can resolve them rapidly. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Security Bug Bounty Program — Mozilla logo    Security Bug Bounty Program — Mozilla

Download Firefox — English (US) ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Client Bug Bounty Program — Mozilla logo    Client Bug Bounty Program — Mozilla

Download Firefox — English (US) ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Web and Services Bug Bounty Program — Mozilla logo    Web and Services Bug Bounty Program — Mozilla

Download Firefox — English (US) ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

myntra : Security whitehat logo    myntra : Security whitehat

At Myntra, we take the security of our systems seriously, and it is our constant endeavor to make our website a safe place for our customers to browse. However, in the rare case when some security researcher or member of the general public identifies a vulnerability in our systems, and responsibly shares the details of it with us, we appreciate their contribution, work closely with them to address such issues with urgency, and if they want, publicly acknowledge their contribution. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Moodle security procedures - MoodleDocs logo    Moodle security procedures - MoodleDocs

We treat security issues in Moodle software very seriously. Even though we dedicate a lot of time designing our code to avoid such problems, it is inevitable in a project of this size that new vulnerabilities will occasionally be discovered. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

motorolasolutions : Motorola Solutions Bug Submission Program - Motorola Solutions logo    motorolasolutions : Motorola Solutions Bug Submission Program - Motorola Solutions

Your authenticated session has expired due to inactivity. You can close this message and continue as a guest or log in again before proceeding. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Microsoft Bounty Program logo    Microsoft Bounty Program

...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Microsoft Cloud Bounty | MSRC logo    Microsoft Cloud Bounty | MSRC

...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Cisco Meraki | Meraki | Security, Reliability, and Privacy logo    Cisco Meraki | Meraki | Security, Reliability, and Privacy

Cisco Meraki’s cloud-based location analytics and user engagement solution provides data about visitors to physical locations, enabling businesses to better understand the behavior of clients. Location Analytics is available with all Cisco Meraki wireless access points. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

microsoft :  logo    microsoft :

...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

MEGA logo    MEGA

The MEGA Vulnerability Reward Program February 2nd 2013 by: Admin Immediately after our launch, our security model and implementation came under intense crossfire, most of which turned out to be damp squibs (Forbes and ars technica publ ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Reporting security bugs - MediaWiki logo    Reporting security bugs - MediaWiki

Security issues for Mediawiki, ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

MAGIX Disclosure Guidelines logo    MAGIX Disclosure Guidelines

contributions to the security of MAGIX products ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Security - Mahara Wiki logo    Security - Mahara Wiki

Security is very important to Mahara developers. As potential issues are reported to us, we will test, patch if applicable, and release fixes as quickly as possible to the Mahara software. ...
Read More
Thanks
Gift
Hall of Fame
Reward

FireBounty © 2015-2019

Legal notices