• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cloudflare opens $3,000 bug bounty program to the public

Cloudflare opens $3,000 bug bounty program to the public

You are here: Home / General Cyber Security News / Cloudflare opens $3,000 bug bounty program to the public
February 3, 2022

Cloudflare, a service provider of web infrastructure and security services, has announced the launch of its public bug bounty application.

Bug hunters and security scientists can now report vulnerabilities uncovered in Cloudflare goods as element of the company’s most current software, which is hosted on HackerOne.

A private bounty application was formerly released in 2018, next a vulnerability disclosure software in 2014. The company compensated $211,512 in bounties all through the life span of this method, with 292 out of the 430 studies receiving a reward.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Rewards for Cloudflare’s most up-to-date software fluctuate with the severity of the vulnerability. Each and every security flaw is assigned a severity ranking based mostly on the Common Vulnerability Scoring Conventional (CVSS) edition 3.

There is a $3,000 payment for a critical vulnerability report, although superior, medium, and minimal vulnerabilities are well worth $1,000, $500, and $250, respectively. Nevertheless, rewards range for secondary and other targets.

As a way to make vulnerability investigate easier, Cloudflare also made a sandbox known as CumulusFire, which offers a standardized playground for scientists to examination their exploits. The sandbox will also guide Cloudflare’s security groups in reproducing potential exploits for evaluation.

“CumulusFire has previously aided us tackle the continual trickle of reports in which researchers would configure their origin server in an obviously insecure way, further than default or anticipated configurations, and then report that Cloudflare’s WAF does not block an attack. By coverage, we will now only take into account WAF bypasses a vulnerability if it is reproducible on CumulusFire,” described Cloudflare.

A great spot to commence is to refer to the documentation on Cloudflare’s developer and API portals, the Understanding Centre, and its help message boards.

The firm also aims to increase supplemental documentation, screening platforms, and a way for researchers to interact with its security teams to make certain submissions are legitimate.


Some sections of this report are sourced from:
www.itpro.co.uk

Previous Post: «new wave of cyber attacks target palestine with political bait New Wave of Cyber Attacks Target Palestine with Political Bait and Malware
Next Post: New Variant of UpdateAgent Malware Infects Mac Computers with Adware new variant of updateagent malware infects mac computers with adware»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.