Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.

9 Top Bug Bounty Programs

874 vues

Publié le

What companies have paid the most in bug bounties to date

Highest paid bounties and average bounty amount across top programs

How long it takes to respond, pay, and respond to reported vulnerabilities

Top hackers average number of hackers that have reported bugs across each program

Publié dans : Internet
  • Identifiez-vous pour voir les commentaires

9 Top Bug Bounty Programs

  1. 1. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Bounty Average Bounty Paid Top Hacker RECENT REPORT
  2. 2. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Range Average Bounty Paid Top Hacker RECENT REPORT
  3. 3. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Range Average Bounty Paid Top Hacker RECENT REPORT
  4. 4. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Range Average Bounty Paid Top Hacker RECENT REPORT
  5. 5. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Range Average Bounty Paid Top Hacker RECENT REPORT
  6. 6.
  7. 7. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Range Average Bounty Paid Top Hacker RECENT REPORT
  8. 8. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Range Average Bounty Paid Top Hacker RECENT REPORT
  9. 9. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Range Average Bounty Paid Top Hacker RECENT REPORT
  10. 10. ● ●
  11. 11. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Range Average Bounty Paid Top Hacker RECENT REPORT
  12. 12. Gives security researchers clear guidelines for conducting vulnerability discovery activities directed at DoD web properties. Program Launched: Nov 2016 Response Time: 2 days Hackers Thanked: 360 If you have information related to security vulnerabilities of General Motors products and services, we want to hear from you. Program Launched: Jan 2016 Hackers Thanked: 98 Limited to security vulnerabilities in web applications owned by Adobe. Excludes desktop products. Program Launched: March 2015 Reports Resolved: 1,020 Hackers Thanked: 282 Wide scope of properties covering multiple brands, and tiered to bring focus to properties where bugs have more impact. Program Launched: Feb 2015 Reports Resolved: 2 days Hackers Thanked: 100

×