Which types of vulnerabilities and exploits are eligible?

We acquire high-impact vulnerabilities that pose significant security risks and are accompanied by a fully functional, reliable exploit (preferably with a PoC or weaponised chain).

Eligible submissions typically target:

  • Modern desktop and mobile operating systems

  • Widely deployed enterprise software

  • Embedded, IoT, and network devices

For detailed scope, platform coverage, and specific requirements, please refer to our Exploit Acquisition Program.