Microsoft Introduces New Bug Bounty Program

Microsoft introduces a new bug bounty program on Wednesday; offering upto $500 to $15000 for valid submissions. The program begins from 20th Oct 2015 and ends on Jan 20th next year. Vulnerability program is for CoreCLR and ASP.NET 5 betas.

The company urged all hackers and security researchers to report vulnerabilities in its Core CLR and ASP.NET 5 betas, Its open source web application framework for OS X, Linux and Win. The reward will depend on how severe the vulnerability is reported by the researcher.

In a blog post  published today a senior director of Microsoft Security Response Center said; “This bounty is particularly interesting because the libraries and functions included in .NET enable developers to write their own programs with great security and stability, increasingly on many operating systems”.

The company has previously open short term bounty programs and receive huge response from security researchers. Last year Microsoft introduced where researchers are rewarded for reporting the vulnerabilities of Microsoft online services; eg: Office 365.

The criteria has been defined for the participants of this bounty program.

  •  The candidate who report any vulnerability should be 14 years old.
  •  The researcher should not be a part of any organization that permits him from participation. 
  • Researcher should not be the resident of US sanction countries; like North Korea,Iran. 
  • Participant should not be the employee of Microsoft or any of its subsidiary.

The reward of the submitted vulnerability will be decided by the Security Team; according to its quality and complexity. If the same bug was reported by more than one researcher then the bounty will be rewarded to the first submission.

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Blind SQL Injection Tutorial to Hack a Website

In the previous article, we have the basics of SQL Injection; what SQLi is and what are the types of SQL injection. And, In...

What is SQL Injection? Tutorial: Type and Example

What is SQL injection, and what are the types of SQL injection? These are the common questions, and we will seek the answer to...

Are Cisco 300-410 Exam and Its Related Certification Your Pathway to Career Success? Find Out about This

Introduction Career success can mean different things to different people. For some, it could mean having a prestigious title and for others, it could be...

How to Hack Windows 10 Password Using FakeLogonScreen in Kali Linux

This article demonstrates an in-depth guide on how to hack Windows 10 Passwords using FakeLogonScreen. Hacking Windows 10 password is an exciting topic and...