Microsoft now pays up to $40,000 for some .NET vulnerabilities

In February, it announced increased payouts for moderate-severity Microsoft Copilot (AI) security flaws and a 100% award multiplier for all Copilot bounty awards to incentivize AI research. Madeline Eckert, a senior program manager for Researcher Incentives and Bounty at Microsoft, stated that these changes aim to more accurately reflect the complexity involved in discovering and exploiting .NET vulnerabilities. Starting today, Microsoft will pay up to $40,000 for critical remote code execution and privilege escalation security flaws, as well as $30,000 for critical security feature bypasses, and up to $20,000 for critical remote denial-of-service bugs. ​Earlier this year, Microsoft raised bounty awards to $30,000 for AI vulnerabilities found in Power Platform and Dynamics 365 services and products. During last year's Ignite annual conference, Microsoft also launched the Zero Day Quest, a hacking event focusing on cloud and AI products and platforms, and offering $4 million in rewards. Microsoft has expanded its .NET bug bounty program and increased rewards to $40,000 for some .NET and ASP.NET Core vulnerabilities. These changes expand the program's scope, simplify the award structure, and offer great incentives for security researchers," said Eckert. "We're excited to announce significant updates to the Microsoft .NET Bounty Program. Learn how cloud detection and response (CDR) gives security teams the edge they need in this practical, no-nonsense guide.

This Cyber News was published on www.bleepingcomputer.com. Publication date: Thu, 31 Jul 2025 17:25:19 +0000


Cyber News related to Microsoft now pays up to $40,000 for some .NET vulnerabilities

CVE-2023-53109 - In the Linux kernel, the following vulnerability has been resolved: ...
7 months ago
CVE-2024-26633 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2025-21707 - In the Linux kernel, the following vulnerability has been resolved: ...
9 months ago
CVE-2024-36886 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2024-26857 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2024-35893 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
CVE-2024-47685 - In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_reject_ipv6: fix nf_reject_ip6_tcphdr_put() syzbot reported that nf_reject_ip6_tcphdr_put() was possibly sending garbage on the four reserved tcp bits (th->res1) Use ...
1 year ago Tenable.com
CVE-2024-58071 - In the Linux kernel, the following vulnerability has been resolved: ...
8 months ago
CVE-2024-42106 - In the Linux kernel, the following vulnerability has been resolved: ...
11 months ago
CVE-2025-37961 - In the Linux kernel, the following vulnerability has been resolved: ...
6 months ago
CVE-2025-21959 - In the Linux kernel, the following vulnerability has been resolved: ...
8 months ago
CVE-2025-38491 - In the Linux kernel, the following vulnerability has been resolved: ...
4 months ago
CVE-2024-50083 - In the Linux kernel, the following vulnerability has been resolved: tcp: fix mptcp DSS corruption due to large pmtu xmit Syzkaller was able to trigger a DSS corruption: TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending ...
1 year ago Tenable.com
CVE-2024-26781 - In the Linux kernel, the following vulnerability has been resolved: mptcp: fix possible deadlock in subflow diag Syzbot and Eric reported a lockdep splat in the subflow diag: WARNING: possible circular locking dependency detected ...
1 year ago Tenable.com
CVE-2023-52784 - In the Linux kernel, the following vulnerability has been resolved: bonding: stop the device in bond_setup_by_slave() Commit 9eed321cde22 ("net: lapbether: only support ethernet devices") has been able to keep syzbot away from net/lapb, until today. ...
1 year ago Tenable.com
CVE-2024-57802 - In the Linux kernel, the following vulnerability has been resolved: netrom: check buffer length before accessing it Syzkaller reports an uninit value read from ax25cmp when sending raw message through ieee802154 implementation. ...
10 months ago Tenable.com
CVE-2025-21858 - In the Linux kernel, the following vulnerability has been resolved: ...
8 months ago
CVE-2024-50035 - In the Linux kernel, the following vulnerability has been resolved: ppp: fix ppp_async_encode() illegal access syzbot reported an issue in ppp_async_encode() [1] In this case, pppoe_sendmsg() is called with a zero size. Then ppp_async_encode() is ...
1 year ago Tenable.com
CVE-2025-21716 - In the Linux kernel, the following vulnerability has been resolved: ...
9 months ago
CVE-2022-48956 - In the Linux kernel, the following vulnerability has been resolved: ipv6: avoid use-after-free in ip6_fragment() Blamed commit claimed rcu_read_lock() was held by ip6_fragment() callers. It seems to not be always true, at least for UDP stack. syzbot ...
1 year ago Tenable.com
CVE-2025-38476 - In the Linux kernel, the following vulnerability has been resolved: ...
4 months ago
CVE-2023-53462 - In the Linux kernel, the following vulnerability has been resolved: ...
2 months ago
CVE-2025-21677 - In the Linux kernel, the following vulnerability has been resolved: pfcp: Destroy device along with udp socket's netns dismantle. pfcp_newlink() links the device to a list in dev_net(dev) instead of net, where a udp tunnel socket is created. Even ...
10 months ago Tenable.com
CVE-2024-50033 - In the Linux kernel, the following vulnerability has been resolved: slip: make slhc_remember() more robust against malicious packets syzbot found that slhc_remember() was missing checks against malicious packets [1]. slhc_remember() only checked the ...
1 year ago Tenable.com
CVE-2024-56648 - In the Linux kernel, the following vulnerability has been resolved: net: hsr: avoid potential out-of-bound access in fill_frame_info() syzbot is able to feed a packet with 14 bytes, pretending it is a vlan one. Since fill_frame_info() is relying on ...
11 months ago Tenable.com