Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

9 Top Bug Bounty Programs

855 views

Published on

What companies have paid the most in bug bounties to date

Highest paid bounties and average bounty amount across top programs

How long it takes to respond, pay, and respond to reported vulnerabilities

Top hackers average number of hackers that have reported bugs across each program

Published in: Internet
  • Login to see the comments

9 Top Bug Bounty Programs

  1. 1. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Bounty Average Bounty Paid Top Hacker RECENT REPORT
  2. 2. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Range Average Bounty Paid Top Hacker RECENT REPORT
  3. 3. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Range Average Bounty Paid Top Hacker RECENT REPORT
  4. 4. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Range Average Bounty Paid Top Hacker RECENT REPORT
  5. 5. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Range Average Bounty Paid Top Hacker RECENT REPORT
  6. 6.
  7. 7. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Range Average Bounty Paid Top Hacker RECENT REPORT
  8. 8. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Range Average Bounty Paid Top Hacker RECENT REPORT
  9. 9. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Range Average Bounty Paid Top Hacker RECENT REPORT
  10. 10. ● ●
  11. 11. Total Paid Average First Response Thanked Top Bounty Average Resolution Reports Resolved Average Range Average Bounty Paid Top Hacker RECENT REPORT
  12. 12. Gives security researchers clear guidelines for conducting vulnerability discovery activities directed at DoD web properties. Program Launched: Nov 2016 Response Time: 2 days Hackers Thanked: 360 If you have information related to security vulnerabilities of General Motors products and services, we want to hear from you. Program Launched: Jan 2016 Hackers Thanked: 98 Limited to security vulnerabilities in web applications owned by Adobe. Excludes desktop products. Program Launched: March 2015 Reports Resolved: 1,020 Hackers Thanked: 282 Wide scope of properties covering multiple brands, and tiered to bring focus to properties where bugs have more impact. Program Launched: Feb 2015 Reports Resolved: 2 days Hackers Thanked: 100

×