Thank you for your interest in helping us improve the security of our open source products, websites and other properties.

We have created this Bug Bounty program to appreciate and reward your efforts.

Reward Guidelines:

We base all payouts on impact and will reward accordingly. Please emphasize the impact as part of your submission. We are particularly interested and will consider extraordinary submissions for issues that result in full compromise of a system.


Reward Range


$500 – $1,000 depending on severity.


~ $250 to $500


~ $50 to $250


Case to case

Common in all of the above

Certificate of appreciation + inclusion in our hall of fame


The table above outlines the nominal rewards for in-scope assets. We will make the final decision on the bounties and rewards for qualifying vulnerabilities. Bounties will only be awarded to the first reporter of a vulnerability.

The amounts may vary depending on the severity of the issue and the quality of the report. vFairs holds the right to make the final decision at its own discretion.

General Guidelines:

  • We kindly request that vulnerability reports meet certain criteria for consideration. Reports that solely rely on automated tools, scanners, or theoretical attack descriptions without accompanying proof of exploitability will unfortunately not be accepted.
  • To enhance the quality of your submission, please include step-by-step instructions that allow us to replicate and validate the reported vulnerability. A functional proof of concept should be demonstrated to showcase the exploit.
  • Please ensure that your submission contains sufficient and pertinent details to facilitate a comprehensive understanding of the vulnerability. Submissions lacking in this regard will regrettably be declined.
  • Given that our websites share a common stack, vulnerabilities that affect multiple websites will be treated as a single report when determining bounty eligibility.
  • IMPORTANT: We kindly request that communication occur solely via email. Attempts to contact vFairs members via personal phone numbers for updates or inquiries regarding your report may result in a ban and disqualification of your report.
  • IMPORTANT: For all communication, please use the designated email address provided above. Contacting other vFairs team members in an attempt to escalate the bug bounty report may lead to a ban and the disqualification of your report. Your adherence to these guidelines is greatly appreciated.

Qualifying Vulnerabilities:

Any reproducible vulnerability that affects the security of our users is likely to be in scope for the program. Common examples include:

  1. Cross Site Request Forgery (CSRF)
  2. Server Side Request Forgery (SSRF)
  3. Remote Code Execution (RCE)
  4. SQL Injection (SQLi)
  5. Privilege Escalation

Exclusion List:

We are generally not interested in DoS vulnerabilities that are perceived by a lack of rate-limiting or captcha. As a web-scale service, our threshold for rate limiting is higher than you might expect. Of course, if you think you have found an exception to this rule, please let us know.

  1. Marketing/Product website (
  2. Any contact or support forms
  3. Anything SSL (related attacks, insecure cipher suites, etc.)
  4. Weak Captcha / Captcha Bypass
  5. Username / Email Enumeration
  6. Brute Force attacks on our Login or Forgot Password pages
  7. Account lockout enforcement and related attacks
  8. HTTP security headers and Cookies related Issues
  9. Weak password policies
  10. CSRF on forms that are available to anonymous users (e.g., login or contact forms)
  11. Clickjacking
  12. Anything related to Mail Server Domain Misconfiguration (Email spoofing, missing DMARC, SPF/DKIM, etc.)
  13. Vulnerabilities impacting only old or end-of-life platforms, browsers, and plugins
  14. Cross-site scripting (XSS) is out of scope for all impactless domains, such as those hosted in non-production environments
  15. Missing Best Practices that don’t pose a direct security threat will most likely not be accepted
  16. Vulnerabilities discovered in non-production environments

Please ensure any reported vulnerabilities are relevant to our active and production systems to ensure effective and meaningful security improvements.

Crafting a Report:

If our team cannot reproduce and verify an issue, a bounty cannot be awarded. To help streamline our intake process, we ask that submissions include:

  1. Description of the vulnerability
  2. Steps to reproduce the reported vulnerability
  3. Proof of exploitability (e.g. screenshot, video)
  4. Perceived impact to another user or the organization
  5. Proposed CVSSv3 Vector & Score (without environmental and temporal modifiers)
  6. List of URLs and affected parameters
  7. Other vulnerable URLs, additional payloads, Proof-of-Concept code
  8. Browser, OS and/or app version used during testing
  9. Impact of the bug

Security reports should be sent to

Engage your Audience with an Amazing Virtual Event

Take your events online & boost your ROI. Let's show you how:

Request a Demo