Banner object (1)

Hack and Take the Cash !

2529 policies in database

Latest Vulnerability disclosure policies & Bug Bounty

30/06/2015
Reward
50 $ 

PureVPN logo    PureVPN

Experience Complete Online Security, Privacy and Anonymity. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Security | Puppet.com logo    Security | Puppet.com

First 10 Nodes are free! ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

yp : The qmail security guarantee logo    yp : The qmail security guarantee

My offer still stands. Nobody has found any security holes in qmail. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Prezi logo    Prezi

Discover ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015
30/06/2015

wufoo : Wildbit Security Response logo    wufoo : Wildbit Security Response

Wufoo ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015
Reward

Pinterest logo    Pinterest

Discover ideas for any project or interest, hand-picked by people like you. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Pidgin, libpurple, and finch security and vulnerabilities logo    Pidgin, libpurple, and finch security and vulnerabilities

Being a network client which interacts with untrusted users and servers, managing vulnerabilities and security response is important to the Pidgin project and to our users. We have established procedures for collecting security-related information, and for disclosing this information to the public. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

PAYMILL Developer Centre logo    PAYMILL Developer Centre

Security is our number one priority! If you have any questions or concerns regarding security, please contact us at ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Panzura Security Policy – Panzura logo    Panzura Security Policy – Panzura

Panzura strives to develop products that our customers entrust with their most sensitive information; our goal is to ensure that our products meet the high standard for security our clients demand. This policy documents Panzura’s proactive commitment to identifying, mitigating, and resolving possible security vulnerabilities across our product line. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Sedo’s domain brokerage team buys or sells domains on your behalf logo    Sedo’s domain brokerage team buys or sells domains on your behalf

Whether we're buying your dream domain or selling your premium domains for the best prices, our experienced team of brokers is there for you – dedicated and with discretion guaranteed. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Online Payment Gateway in Australia | Paychoice logo    Online Payment Gateway in Australia | Paychoice

Start accepting all major credit cards, anytime, anywhere. Sometimes you need more options than just credit card payments. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015
Reward

Pantheon logo    Pantheon

Website development is complex. Hosting makes it harder. Top developers, marketers, and IT pros use Pantheon to build, launch, and run all their Drupal and WordPress sites. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

OV-chipkaart - Responsible disclosure logo    OV-chipkaart - Responsible disclosure

Je kunt problemen melden die te maken hebben met onze online dienstverlening of OV-chipkaart. Bijvoorbeeld: ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Responsible Disclosure | PagerDuty logo    Responsible Disclosure | PagerDuty

Flexible schedules, escalations, & alerting ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Security Acknowledgements | OpenText logo    Security Acknowledgements | OpenText

OpenText reviews all reports of security vulnerabilities affecting OpenText products and services. To report a vulnerability in one of our products or solutions, please contact ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Policy - Opera Security Corner logo    Policy - Opera Security Corner

Opera is committed to your security, and we have a long and proven track record of fulfilling that commitment. Below, we take you through the process of how we handle security vulnerabilities when they are discovered and what steps we take to keep you, and others who are using our product, safe while online. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

How to Report Security Vulnerabilities to Oracle | Oracle logo    How to Report Security Vulnerabilities to Oracle | Oracle

Your search did not match any results. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

custhelp : Site Maintenance in progress logo    custhelp : Site Maintenance in progress

...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

OnePageCRM logo    OnePageCRM

Super easy online sales CRM for small business ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Security at Olark | Olark logo    Security at Olark | Olark

Olark uses cookies to give you the best possible experience on our website. By clicking "Continue", you agree to our use of cookies. Refer to our ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

OpenBSD: Security logo    OpenBSD: Security

For security advisories for specific releases, click below: ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

NolimitVPN logo    NolimitVPN

Anonymous and secure Internet access ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Nokia logo    Nokia

...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

nvidia : Product Security logo    nvidia : Product Security

NVIDIA takes security concerns seriously and works to quickly evaluate and address them. Once a security concern is reported, NVIDIA commits the appropriate resources to analyze, validate and provide corrective actions to address the issue. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

ncsc : Kwetsbaarheid melden (CVD) | Contact | Nationaal Cyber Security Centrum logo    ncsc : Kwetsbaarheid melden (CVD) | Contact | Nationaal Cyber Security Centrum

Vindt u een zwakke plek in een systeem van de overheid of in een systeem met een vitale functie? Dan is de gouden regel dat u eerst de eigenaar van het systeem benadert. Pas als de organisatie niet of niet goed reageert, kunt u het NCSC op de hoogte brengen. Wij nemen de rol van intermediair op ons om de kwetsbaarheid of zwakke plek te verhelpen. Het maken van zo'n melding heet Coordinated Vulnerability Disclosure (CVD). ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

netflix : Responsible Vulnerability Disclosure logo    netflix : Responsible Vulnerability Disclosure

Security researchers interested in reporting security vulnerabilities to the Netflix security team can do so via our Bug Bounty ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

How to Report Security Issues to NetApp | NetApp Product Security logo    How to Report Security Issues to NetApp | NetApp Product Security

The security of our products is of primary importance to NetApp and our customers. We accept reports of security vulnerabilities and work to ensure we can resolve them rapidly. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Security Bug Bounty Program — Mozilla logo    Security Bug Bounty Program — Mozilla

Download Firefox — English (US) ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Client Bug Bounty Program — Mozilla logo    Client Bug Bounty Program — Mozilla

Download Firefox — English (US) ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

myntra : Security Whitehat logo    myntra : Security Whitehat

...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Moodle security procedures - MoodleDocs logo    Moodle security procedures - MoodleDocs

We treat security issues in Moodle software very seriously. Even though we dedicate a lot of time designing our code to avoid such problems, it is inevitable in a project of this size that new vulnerabilities will occasionally be discovered. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

motorolasolutions : Motorola Solutions Bug Submission Program - Motorola Solutions logo    motorolasolutions : Motorola Solutions Bug Submission Program - Motorola Solutions

Your authenticated session has expired due to inactivity. You can close this message and continue as a guest or log in again before proceeding. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Microsoft Bounty Program logo    Microsoft Bounty Program

Frequently Asked Questions ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Microsoft Cloud Bounty | MSRC logo    Microsoft Cloud Bounty | MSRC

The Microsoft Online Services Bounty Program invites researchers across the globe to identify and sumbit vulnerabilities in specific Microsoft domains and endpoints. Qualified submissions are eligible for bounty rewards of  ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Cisco Meraki | Meraki | Security, Reliability, and Privacy logo    Cisco Meraki | Meraki | Security, Reliability, and Privacy

Cisco Meraki’s cloud-based location analytics and user engagement solution provides data about visitors to physical locations, enabling businesses to better understand the behavior of clients. Location Analytics is available with all Cisco Meraki wireless access points. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

microsoft :  logo    microsoft :

...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

MEGA logo    MEGA

The MEGA Vulnerability Reward Program February 2nd 2013 by: Admin Immediately after our launch, our security model and implementation came under intense crossfire, most of which turned out to be damp squibs (Forbes and ars technica publ ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Reporting security bugs - MediaWiki logo    Reporting security bugs - MediaWiki

Security issues for Mediawiki, ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

MAGIX Disclosure Guidelines logo    MAGIX Disclosure Guidelines

contributions to the security of MAGIX products ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Security - Mahara Wiki logo    Security - Mahara Wiki

Security is very important to Mahara developers. As potential issues are reported to us, we will test, patch if applicable, and release fixes as quickly as possible to the Mahara software. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

White Hat Reward - ManageWP logo    White Hat Reward - ManageWP

Every day we do our best to make sure ManageWP is running safely and securely. But we’re only human, and there’s always a chance that we missed something. That’s where our mighty contributors came in – they found a weakness in our security, collected the cash reward and got listed as a contributor! ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

logentries : Security logo    logentries : Security

Find comprehensive guides and documentation to help you start and continue to work with Logentries. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Security Policy | AppOptics logo    Security Policy | AppOptics

SolarWinds is committed to taking our customers security and privacy concerns seriously and makes it a priority. We strive to implement and maintain security processes, procedures, standards, and take all reasonable care to prevent unauthorized access our customer data. We apply appropriate administrative, operational, and technical security controls to help ensure that our customer data is handled and processed in a responsible and secure manner. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

LastPass Security logo    LastPass Security

Security is our highest priority at LastPass, including quickly responding to and ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Responsible Disclosure - Kissflow logo    Responsible Disclosure - Kissflow

We take the security of our systems seriously, and we value the security community. Responsible disclosure of security vulnerabilities helps us ensure the security and privacy of our users. ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Kyup logo    Kyup

We are excited to announce that GetClouder is now Kyup. Our CEO Tenko Nikolov shares some of the reasoning behind the rebranding ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Bug Bounty | Kraken logo    Bug Bounty | Kraken

Bug Bounty ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

kayak : logo    kayak :

Responsible Disclosure Policy We are committed to ensuring the privacy and safety of our users. If you think that you have discovered a security vulnerability on our web site or within our mobile apps we appreciate your help in disclosing the ...
Read More
Thanks
Gift
Hall of Fame
Reward
30/06/2015

Report a Security Vulnerability - Juniper Networks logo    Report a Security Vulnerability - Juniper Networks

The Juniper Networks Security Incident Response Team has an email alias that makes it easy for customers and others to report potential security vulnerabilities. ...
Read More
Thanks
Gift
Hall of Fame
Reward

FireBounty © 2015-2020

Legal notices