Connect with us

Hi, what are you looking for?


Management & Strategy

Mozilla Offers Bigger Rewards for Firefox Vulnerabilities

Mozilla on Thursday announced some changes to its Firefox bug bounty program, including bigger rewards and its decision to accept duplicate reports in some cases.

Mozilla on Thursday announced some changes to its Firefox bug bounty program, including bigger rewards and its decision to accept duplicate reports in some cases.

The organization has been running a bug bounty program since 2004, and between 2017 and 2019 it paid out nearly $1 million for roughly 350 vulnerabilities. The average payout in this timeframe was approximately $2,700, but the most commonly awarded amount was $4,000.

Mozilla has now decided that the highest severity bugs can earn a researcher up to $10,000 if they’re accompanied by a high quality report. These types of vulnerabilities include sandbox escapes, code execution flaws, and techniques for bypassing WebExtension install prompts.

High-impact issues such as memory corruption, same origin bypass that results in user data leakage, and obtaining a user’s IP if a proxy is configured can now earn researchers between $3,000 and $5,000.

“Again, we want to emphasize – if it wasn’t already – that a bounty amount is not determined based on your initial submission, but rather on the outcome of the discussion with developers. So improving test cases post-submission, figuring out if an engineer’s speculation is founded or not, or other assistance that helps resolve the issue will increase your bounty payout,” Mozilla’s Tom Ritter said in a blog post.

Mozilla also informed bug bounty hunters that it now allows duplicate submissions, which can be common in the case of researchers who are fuzzing Firefox Nightly builds and find the same vulnerability within hours of each other. Mozilla has decided that the bug bounty for a flaw will be split among all researchers who reported the same issue within 72 hours of the first report.

Last November, Mozilla announced that the top reward for security holes affecting its critical and core websites and services increased to $15,000.

Advertisement. Scroll to continue reading.

Related: Mozilla to Researchers: Stay Away From User Data and We Won’t Sue

Related: Mozilla Patches Two Firefox Vulnerabilities Exploited in Attacks

Related: Firefox, IE Vulnerabilities Exploited in Attacks on China, Japan

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join security experts as they discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business.


Join Microsoft and Finite State for a webinar that will introduce a new strategy for securing the software supply chain.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.