Security Researcher Hall of Fame

Security Researcher Hall of Fame Winners

Rank

Security Researcher

1

arielrachamim

2

kushal89shah

Anonymous

3

green-jam

4

lpi

prl

5

kushal89shah

Anonymous

6

kushal89shah

Anonymous

7

alinenehme97

8

a_l

9

lpi

10

kushal89shah

Rank

Security Researcher

1

arielrachamim

2

kushal89shah

Anonymous

3

lpi

prl

4

green-jam

5

jr0ch17

6

mrhavit

7

alinenehme97

8

kushal89shah

9

kushal89shah

10

a_l

a_l

Rank

Security Researcher

1

arielrachamim

2

green-jam

3

lpi

prl

4

mrhavit

5

lpi

lpi

6

kushal89shah

Anonymous

7

lpi

8

todayisnew

9

kushal89shah

Anonymous

10

todayisnew

Rank

Security Researcher

1

arielrachamim

2

akashhamal0x01

3

green-jam

4

kushal89shah

Anonymous

5

lpi

lpi

6

blacklis

7

nagli

8

dhakal_ananda

9

alexandrio

10

Matanber

Additionally, we would also like to thank industry partners for helping Adobe build resiliency in our products: 

  • Mat Powell working with Trend Micro Zero Day Initiative (ZDI)

What is it? 

The Researcher Hall of Fame initiative provides an opportunity to recognize and celebrate the most impactful security researchers who have demonstrated tremendous dedication to their craft and helped strengthen protections for our products, services, and customers. 

We welcome all security researchers, ranging from hobbyists to full-time ethical hackers, to participate in the Security Researcher Hall of Fame by submitting a report to Adobe's Bug Bounty Program (more info here).

How does it work?

Researcher Points will be awarded for each valid submission on Adobe's Bug Bounty Program. Researcher points will accumulate for a final score calculated at the end of each testing period. To help ensure an equal opportunity for all, Researcher Points will reset at the beginning of each testing period. 

Scoring Process

Any valid and unique submission reported to Adobe's bug bounty program will be awarded Hall of Fame points based on the below table. Adobe's standard policy scope and exclusions apply.

Severity

Low

Medium

High

Critical

Quarterly Challenge:

Any CISA Known Exploited

Vulnerability (KEV) CVE

Points

1p

2p

6p

10p

20p

Rewards

At the conclusion of each testing period, total Researcher Points will be tallied for all participating researchers and the Top 10 point earners will be announced. In addition to being commemorated in the Hall of Fame initiative, each Top 10 researcher will be eligible to choose one of the following rewards: 

12-month subscription to Adobe's Creative Cloud Suite

CC All Apps

The North Face® Canyon Flats Fleece Jacket

TNF Jacket

The North Face® Chest Logo Pullover Hoodie

TNF Hoodie

Nike® Dri-FIT Cotton/Poly Tee +

40oz Denali Thermos with Handle and Straw

ThermosTshirtFinal

(C) 2023 Adobe. All rights reserved
Adobe and the Adobe logo are either registered trademarks or trademarks of Adobe in the United States and/or other countries. All other trademarks are the property of their respective owners.

For more information, visit https://helpx.adobe.com/security/bug-bounty-program.html, or email PSIRT@adobe.com.

 Adobe

Get help faster and easier

New user?