This is a list of Bug Bounty programs and where to get more information to make a responsible disclosure and make profit.
We know that the security and availability of your business data is extremely important. We proactively monitor our IT environment, systems and continuously evaluate our security practices, taking reasonable steps to maintain this trust and…
The easiest way to caption and translate any video, with crowdsourcing, volunteers, and professional services.
If you have a problem with your password, please contact support. If you have a complaint about a site hosted on WordPress.com, please see our complaints page. If your site has been suspended for a…
Report any vulnerabilities you find here.
Since 2013, (ISC)² has been a partner of Bugcrowd, running a public bug bounty program and offering CPE credits to our members. Bugcrowd is a leading provider of crowdsourced security and bug bounty programs, connecting organizations with more than 50,000 independent security researchers to...
Мамба выплачивает вознаграждение за каждую найденную уязвимость в приложениях, наличие которой подтвердилось нашими специалистами.
Be the first to know about software releases and important cPanel news.
Evernote users trust us with billions of their notes, projects, and ideas. That trust is based upon us keeping that data both private and secure.
To report issues that are not security-related, please contact us through our general support page. Report a Security Incident Pocket is a product operated by M
The Internet Bug Bounty. Rewarding friendly hackers who contribute to a more secure internet.
Reflecting the rapidly increasing convergence of connectivity technology and the automotive industry, FCA US LLC today announced the launch of a public bug bounty program on the Bugcrowd platform to enhance the safety and security of its consumers, their vehicles and connected services.
Reporting a Security Vulnerability OpenText reviews all reports of security vulnerabilities affecting OpenText products and services. Learn more.
Learn more about the responsible disclosure policy SproutSocial.com, a social media management tool for business.
Keeping customer data safe and secure is our top priority. If you've discovered a security vulnerability, please do not share it publicly. Instead, report it to
Learn how IBM's Security Vulnerability Management program comprehensively addresses security vulnerabilities in IBM products, offerings, and websites.
Here is list of independent security researches that have helped us improve our platform and create a more secure ecosystem for our users.
ActiveCampaign is heavily focused on GDPR and HIPAA compliance. Learn more about our approach to data protection and security.
The Avast Bug Bounty Program compensates hackers who identify and eliminate security bugs in our products. Success means you’ll get a cash prize, and might be inducted into our Hacker Hall of Fame!
The Eclipse Foundation - home to a global community, the Eclipse IDE, Jakarta EE and over 375 open source projects, including runtimes, tools and frameworks.
Cost of Living comparisons for thousands of cities. Fully up-to-date cost of living comparisons, including prices of 52 products and services.
Fluxiom offers seamless online file management in the cloud. Keep your files private, share them with a select audience or broadcast them to the world.
Simple, powerful, free tools to create and use millions of apps.
Tell Freelancer about security vulnerabilities in their website and be recognised for your contributions.
Gemfury is a hosted repository for your public and private packages, where they are safe and within reach.
Report an issue here! Search for an existing bug: Making good bug reports is a great way to help increase the software quality of GIMP. A good bug report provides unambiguous step-by-step instructions on how to reproduce the bug, what result is expected, and what the actual result is. Good …
Infoplus Warehouse Management System Legal - Responsible Disclosure Policy
IntegraXor HMI/SCADA Bug Bounty Program This Non-Monetary Bug Bounty Program is part of our effort to make IntegraXor SCADA more secure, safe & stable. Below are the rules for joining. Terms & conditions apply. Considerations We only concern on the issue that will impact our customers’...
Cloud managed networking from Cisco Meraki. The easiest and most IT-friendly solution for enterprise networking needs.
Modernize your data management systems and simplify cloud data storage with NetApp – the world’s leader in data management solutions.
Convert more customers, get paid faster and streamline your business. Set up direct debit payments, payment gateways and real-time payments with PCI DSS security.
I am glad to announce that we are embracing a bug bounty program. In the moment, since we are just a small company we can only list you in our Hall of Fame as a token of appreciation- Responsible Disclosure
Ontdekt u een zwakke plek of kwetsbaarheid op deze website, meld dit dan aan het Nationaal Cyber Security Centrum (NCSC). Het maken van zo'n melding heet Coordinated Vulnerability Disclosure (CVD).
A language empowering everyone to build reliable and efficient software.
We werken elke dag hard om te zorgen dat je je bankzaken veilig kunt regelen bij SNS.
Find contact information for sales, support, press inquiries, or other requests. Chat with a Sonatype representative immediately.
studiVZ | Schon dabei? studiVZ ist dein kostenloses Netzwerk! Vernetze dich mit Kommilitonen, Freunden oder ganz neuen Leuten – auch im freundeVZ. Profil gestalten, Fotos hochladen, Verabreden, Chatten, Diskutieren … und noch vieles mehr.
Public key contact information for Zetetic
18F builds effective, user-centric digital services focused on the interaction between government and the people and businesses it serves.
Vulnerability Acknowledgements for Red Hat online services.
Mehr Transparenz und Sicherheit: Die Aircloak Attack Challenge ist das weltweit erste Bounty-Programm für eine Anonymisierungsmethode.
Hello! Were glad to inform you that we are contributing to the OSTIF project for an extensive OpenVPN 2.4 audit and bugs bounty. https://airvpn.org/missionhttps://ostif.org/top-ostif-donors/ Kind regards & dataloveAirVPN Staff
Information related to the Ghostscript and MuPDF Bug Bounty Program.
Learn more about Asana’s bug bounty program powered by Bugcrowd, the leader in crowdsourced security solutions.
Rapidly integrate authentication and authorization for web, mobile, and legacy applications so you can focus on your core business.
We’re the tech team behind social networking apps Bumble and Badoo. Our products help millions of people build meaningful connections around the world.
Have you discovered a web security flaw that might impact one of our products? Here’s how you can report it.
Today, we’re happy to announce the opening of our bug bounty program to the developer community. Bitaccess has long maintained private bounty programs, allowing security researchers to analyze pre- and […]
Bitbns Invites individuals and companies to test and report errors if found.
Reporting security issuesIf you discover a problem or a vulnerability in our systems, we would appreciate it if you share this information with us (as soon as possible). Serious security errors will be rewarded with a sum of bitcoins (bug bounty) or an honorable mention in the “wall of fame”.
Update Dec 3, 2019: This article is out of date. See the latest Bug Bounty.
NEW PROGRAM IS AVAILABLE AT: ARK Development and Security Bounty Program ARK has some great news about the GitHub Development Bounty Program. We have decided that with the New Year, the ARK GitHub Bounty Program will now become a PERMANENT GitHub bounty. What does that mean for you, dear ARK...
Blogs, news, updates, and information of all kinds can be found here at the Bitwarden Blog.
That’s why I am very happy to announce that Centrify has opened a public bug bounty program today with the help of Bugcrowd.
We believe in a Bug Bounty program that fosters collaboration amongst professionals to help us building the most secure and useful wallet…
At Tendermint, we believe that security researchers and white hat hackers are a vital part of building strong, resilient cryptocurrency…
As we approach the launch of Ethfinex and the Nectar token, we are now running an open bug bounty program for the Ethereum community to analyse our token contracts. The Nectar token contracts have been published on Github and are available for review here. Details about token functionality and...
We believe in a decentralized economy and cryptocurrency community. The Bounty program is aimed at engaging community in our campaign…
We’re excited to announce that we are conducting a bug bounty for all contracts relevant for our upcoming DutchX release as well as the…
Today, we are publishing a Smart Contract for public review.
The IOTA Bug Bounty program was announced now more than a month ago. During this timeframe many of the existing, but also new community members participated in the bug hunting. In total, we have found more than 35 issues (mostly in the low category) which the dev team quickly resolved.
Updates: This bug bounty was created for the first mainnet deployment. We are still running on-going bug bounty campaigns for various code…
The Leverj staking contract is running on ropsten and very soon will be running on mainnet.
A security bug in a common Meteor configuration which requires your attention
Security is a top priority for Request Network. To make sure the protocol stays secure we are officially launching a Bug Bounty program…
At Splitwise, we’re lucky to have supportive users who help us to find bugs and potential security vulnerabilities via responsible disclosure. If you believe you have discovered a potential issue w…
We want to help you learn about the human resources and employee engagement. Get practical advice on remote work, team building, and succeeding at work.
HackerOne and Vanilla Forums partner to make the Vanilla platform more secure.
We’re excited to announce that we are starting our bug bounty ahead of the Líf Token Generation Event. We believe bug bounties are…
YesWeHack, Bug Bounty & VDP platform will help you to detect, fix & secure the vulnerabilities of your applications! +400 programs over 175 countries.
BRD is the simple and secure way to get started with Bitcoin, Ethereum and other cryptocurrencies.
We’re committed to our users’ rights to privacy, and are in full support of efforts to ensure your protection online. See all the steps we take to ensure your privacy and protection.
LINE Corporation will host the LINE Security Bug Bounty Program.
Prezi designs and creates presentation software that is enabling millions of people to be great presenters.
Learn more about Barracuda Networks’s vulnerability disclosure program powered by Bugcrowd, the leader in crowdsourced security solutions.
Learn more about Meraki’s bug bounty program powered by Bugcrowd, the leader in crowdsourced security solutions.
Learn more about Endurance’s vulnerability disclosure program powered by Bugcrowd, the leader in crowdsourced security solutions.
Learn more about eero’s vulnerability disclosure program powered by Bugcrowd, the leader in crowdsourced security solutions.
Learn more about Fitbit’s bug bounty program powered by Bugcrowd, the leader in crowdsourced security solutions.
Learn more about Freedom of the Press Foundation’s bug bounty program powered by Bugcrowd, the leader in crowdsourced security solutions.
Learn more about Humble Bundle’s vulnerability disclosure program powered by Bugcrowd, the leader in crowdsourced security solutions.
Learn more about Indeed’s bug bounty program powered by Bugcrowd, the leader in crowdsourced security solutions.
Learn more about Intercom’s bug bounty program powered by Bugcrowd, the leader in crowdsourced security solutions.
Learn more about Overstock.com’s vulnerability disclosure program powered by Bugcrowd, the leader in crowdsourced security solutions.
Learn more about Socrata’s bug bounty program powered by Bugcrowd, the leader in crowdsourced security solutions.
Learn more about Atlassian’s bug bounty program powered by Bugcrowd, the leader in crowdsourced security solutions.
Learn more about Western Union’s bug bounty program powered by Bugcrowd, the leader in crowdsourced security solutions.
Flyspray, a Bug Tracking System written in PHP.
Cappasity is a cloud-based platform that lets online stores easily create and deliver 3D, VR and AR shopping experiences. 3D and 360 Product Photography.
Our semi-integrated unified commerce solution connects every channel, so merchants can engage their customers while shopping online and in-store.
Chargify is the best online billing software for all of your Recurring Billing needs. Learn more about simplifying your Subscription Billing today.
Read our data security policy to understand how we protect your data at CircleCI.
HONOR global official community offers rich and high-quality content around its various products, including smartphones, wearables, laptops and accessories. Also, you are welcome to participate in exciting activities online.
Velocity synthesizes the data from your repos to give you full visibility and empowers your team for continuous delivery.
Eve Online is the world's largest MMO RPG universe rich in adventure, as player corporations compete in a massively multiplayer online space game.
If you have found a security vulnerability on Teradici products, please let us know.
The Red Hat Customer Portal delivers the knowledge, expertise, and guidance available through your Red Hat subscription.
Tuenti tiene una oferta inigualable que ninguna otra compañía puede ofrecerte: llamadas, gigas, la mejor cobertura, chat y llamadas sin límites con la app, y mucho más.
Contact us, if you discover any vulnerabilities on our websites and help us improve the safety and reliability of our systems.
Now with Feedback Assistant available on iPhone, iPad, Mac, and the web, it’s easier to submit effective bug reports and request enhancements to APIs and tools.
As part of our commitment to security, we reward security researchers for reporting security vulnerabilities responsibly to us.
Learn more about DNSimple security and responsible security disclosure program.
How to Submit a Bug Report. Learn how to get started with Nuxeo documentation.
TruValidate Multifactor Authentication documentation
Rollbar aims to keep its Services safe for everyone, and data security is of utmost priority. If you are a security researcher and have discovered a security vulnerability in the Services, we appreciate your help in disclosing it to us in a responsible manner. Rollbar will engage with security...
Goals of the security team Resolve reported security issues in a Security Advisory Provide assistance for contributed module maintainers in resolving security issues Provide documentation on how to write secure code Provide documentation on securing your site Help the infrastructure team to keep...
The following outlines how Duo Labs handles vulnerability disclosure as well as what security researchers and customers can expect when they disclose a vulnerability to Duo Security.
As a worldwide provider of business and financial information, security is one of our top priorities. We process millions of company and director...
Responsible Disclosure Security isn’t easy, and we all know it. That’s why we’re running a responsible disclosure program. …
First 100 Days of Yelp's Public Bug Bounty Program Martin Georgiev, Software Engineer Dec 20, 2016 One hundred days ago we launched Yelp’s public bug bounty program on HackerOne. Since...
Connect, motivate, align, and engage employees, channel partners, sales team, and consumers with our engagement, rewards, commission, and incentive technology.
Espressif ESP32 Official Forum