Banner object (1)

Hack and Take the Cash !

836 bounties in database

Latest Bug Bounty & Vulnerability disclosure programs

30/06/2015
Reward

Pinterest logo    Pinterest

Discover ideas for any project or interest, hand-picked by people like you. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Pidgin, libpurple, and finch security and vulnerabilities logo    Pidgin, libpurple, and finch security and vulnerabilities

Being a network client which interacts with untrusted users and servers, managing vulnerabilities and security response is important to the Pidgin project and to our users. We have established procedures for collecting security-related information, and for disclosing this information to the public. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

PAYMILL Developer Centre logo    PAYMILL Developer Centre

Security is our number one priority! If you have any questions or concerns regarding security, please contact us at ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Panzura Security Policy – Panzura logo    Panzura Security Policy – Panzura

Panzura strives to develop products that our customers entrust with their most sensitive information; our goal is to ensure that our products meet the high standard for security our clients demand. This policy documents Panzura’s proactive commitment to identifying, mitigating, and resolving possible security vulnerabilities across our product line. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Sedo’s domain brokerage team buys or sells domains on your behalf logo    Sedo’s domain brokerage team buys or sells domains on your behalf

Sedo uses cookies to optimize the design of its websites. By continuing your visit on the website, you consent to the use of cookies. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Online Payment Gateway in Australia | Paychoice logo    Online Payment Gateway in Australia | Paychoice

Start accepting all major credit cards, anytime, anywhere. Sometimes you need more options than just credit card payments. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015
Reward

Pantheon logo    Pantheon

Website development is complex. Hosting makes it harder. Top developers, marketers, and IT pros use Pantheon to build, launch, and run all their Drupal and WordPress sites. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

OV-chipkaart - Responsible disclosure logo    OV-chipkaart - Responsible disclosure

Je kunt problemen melden die te maken hebben met onze online dienstverlening of OV-chipkaart. Bijvoorbeeld: ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Responsible Disclosure | PagerDuty logo    Responsible Disclosure | PagerDuty

Flexible schedules, escalations, & alerting ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Security Acknowledgements | OpenText logo    Security Acknowledgements | OpenText

OpenText reviews all reports of security vulnerabilities affecting OpenText products and services. To report a vulnerability in one of our products or solutions, please contact ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Policy - Opera Security Corner logo    Policy - Opera Security Corner

Opera is committed to your security, and we have a long and proven track record of fulfilling that commitment. Below, we take you through the process of how we handle security vulnerabilities when they are discovered and what steps we take to keep you, and others who are using our product, safe while online. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

How to Report Security Vulnerabilities to Oracle | Oracle logo    How to Report Security Vulnerabilities to Oracle | Oracle

Your search did not match any results. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

custhelp : Site Maintenance in progress logo    custhelp : Site Maintenance in progress

...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

OnePageCRM logo    OnePageCRM

Super easy online sales CRM for small business ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Security at Olark | Olark logo    Security at Olark | Olark

Olark uses cookies to give you the best possible experience on our website. By clicking "Continue", you agree to our use of cookies. Refer to our ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

OpenBSD: Security logo    OpenBSD: Security

For security advisories for specific releases, click below: ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

NolimitVPN logo    NolimitVPN

Anonymous and secure Internet access ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Nokia logo    Nokia

...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

nvidia : Product Security logo    nvidia : Product Security

NVIDIA takes security concerns seriously and works to quickly evaluate and address them. Once a security concern is reported, NVIDIA commits the appropriate resources to analyze, validate and provide corrective actions to address the issue. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

ncsc : Kwetsbaarheid melden (CVD) | Contact | Nationaal Cyber Security Centrum logo    ncsc : Kwetsbaarheid melden (CVD) | Contact | Nationaal Cyber Security Centrum

Vindt u een zwakke plek in een systeem van de overheid of in een systeem met een vitale functie? Dan is de gouden regel dat u eerst de eigenaar van het systeem benadert. Pas als de organisatie niet of niet goed reageert, kunt u het NCSC op de hoogte brengen. Wij nemen de rol van intermediair op ons om de kwetsbaarheid of zwakke plek te verhelpen. Het maken van zo'n melding heet Coordinated Vulnerability Disclosure (CVD). ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

netflix : Responsible Vulnerability Disclosure logo    netflix : Responsible Vulnerability Disclosure

Security researchers interested in reporting security vulnerabilities to the Netflix security team can do so via our Bug Bounty ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

How to Report Security Issues to NetApp | NetApp Product Security logo    How to Report Security Issues to NetApp | NetApp Product Security

The security of our products is of primary importance to NetApp and our customers. We accept reports of security vulnerabilities and work to ensure we can resolve them rapidly. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Security Bug Bounty Program — Mozilla logo    Security Bug Bounty Program — Mozilla

Download Firefox — English (US) ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Client Bug Bounty Program — Mozilla logo    Client Bug Bounty Program — Mozilla

Download Firefox — English (US) ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Web and Services Bug Bounty Program — Mozilla logo    Web and Services Bug Bounty Program — Mozilla

Download Firefox — English (US) ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

myntra : Security Whitehat logo    myntra : Security Whitehat

...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Moodle security procedures - MoodleDocs logo    Moodle security procedures - MoodleDocs

We treat security issues in Moodle software very seriously. Even though we dedicate a lot of time designing our code to avoid such problems, it is inevitable in a project of this size that new vulnerabilities will occasionally be discovered. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

motorolasolutions : Motorola Solutions Bug Submission Program - Motorola Solutions logo    motorolasolutions : Motorola Solutions Bug Submission Program - Motorola Solutions

Your authenticated session has expired due to inactivity. You can close this message and continue as a guest or log in again before proceeding. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Microsoft Bounty Program logo    Microsoft Bounty Program

...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Microsoft Cloud Bounty | MSRC logo    Microsoft Cloud Bounty | MSRC

...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Cisco Meraki | Meraki | Security, Reliability, and Privacy logo    Cisco Meraki | Meraki | Security, Reliability, and Privacy

Cisco Meraki’s cloud-based location analytics and user engagement solution provides data about visitors to physical locations, enabling businesses to better understand the behavior of clients. Location Analytics is available with all Cisco Meraki wireless access points. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

microsoft :  logo    microsoft :

...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

MEGA logo    MEGA

The MEGA Vulnerability Reward Program February 2nd 2013 by: Admin Immediately after our launch, our security model and implementation came under intense crossfire, most of which turned out to be damp squibs (Forbes and ars technica publ ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Reporting security bugs - MediaWiki logo    Reporting security bugs - MediaWiki

Security issues for Mediawiki, ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

MAGIX Disclosure Guidelines logo    MAGIX Disclosure Guidelines

contributions to the security of MAGIX products ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Security - Mahara Wiki logo    Security - Mahara Wiki

Security is very important to Mahara developers. As potential issues are reported to us, we will test, patch if applicable, and release fixes as quickly as possible to the Mahara software. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

White Hat Reward - ManageWP logo    White Hat Reward - ManageWP

Every day we do our best to make sure ManageWP is running safely and securely. But we’re only human, and there’s always a chance that we missed something. That’s where our mighty contributors came in – they found a weakness in our security, collected the cash reward and got listed as a contributor! ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

logentries : Security logo    logentries : Security

Find comprehensive guides and documentation to help you start and continue to work with Logentries. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Security Policy | AppOptics logo    Security Policy | AppOptics

SolarWinds is committed to taking our customers security and privacy concerns seriously and makes it a priority. We strive to implement and maintain security processes, procedures, standards, and take all reasonable care to prevent unauthorized access our customer data. We apply appropriate administrative, operational, and technical security controls to help ensure that our customer data is handled and processed in a responsible and secure manner. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

LastPass Security logo    LastPass Security

Security is our highest priority at LastPass, including quickly responding to and ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Responsible Disclosure - Kissflow logo    Responsible Disclosure - Kissflow

One platform to optimize, manage, and track all of your work ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Kyup logo    Kyup

We are excited to announce that GetClouder is now Kyup. Our CEO Tenko Nikolov shares some of the reasoning behind the rebranding ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Bug Bounty | Kraken logo    Bug Bounty | Kraken

Bug Bounty ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

kayak : logo    kayak :

Responsible Disclosure Policy We are committed to ensuring the privacy and safety of our users. If you think that you have discovered a security vulnerability on our web site or within our mobile apps we appreciate your help in disclosing the ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Report a Security Vulnerability - Juniper Networks logo    Report a Security Vulnerability - Juniper Networks

The Juniper Networks Security Incident Response Team has an email alias that makes it easy for customers and others to report potential security vulnerabilities. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

joomla : CMS - Report an Issue logo    joomla : CMS - Report an Issue

Joomla! values community feedback for catching and reporting issues in the CMS. The bug tracker provides a central location for reporting these issues. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Security — JRuby.org logo    Security — JRuby.org

Please send an email to ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

iwantmyname logo    iwantmyname

Painless domain management ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Responsible Disclosure – Informatiebeveiliging Nederland logo    Responsible Disclosure – Informatiebeveiliging Nederland

Versie 2 d.d. 28 november 2013 ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

intel : Security Center logo    intel : Security Center

Try these quick links to visit popular site sections ...
Read More
Thanks
Gift
Hall of Fame
Reward

FireBounty © 2015-2019

Legal notices