Total Reports:15
Total Valid Reports:6
popIn Discovery


- Program
- popIn Discovery
- Program Logo
-
- Period
- 2016/05/10 〜 2016/06/30
- Total Bounties
- ¥300,000
- Bounty Range
- ¥5,000 ~ ¥100,000
- Rules
- Only test for vulnerabilities on web application stipulated in scope section. Any vulnerabilities reported on web applications out-of-scope are not eligible for bounty rewards.
***************************************************************
Data tampering with vulnerability found through this program is explicitly prohibited.
Any vulnerability test against domains out-of-scope are explicitly prohibited.
※ Domain "bwrite.biz" is out-of-scope !!!
***************************************************************
Any violation of the Terms of the Service of the “BugBounty.jp”, and/or performance of DoS (Denial of Service)attack or equivalent act that can degrade the performance of our service are also explicitly prohibited. - Scope
-
popIn Discovery
http://cdn.popin.cc/test/pc.html
The following domains are in-scope for this program.
cdn.popin.cc
discoveryplus.popin.cc
api.popin.cc
rlog.popin.cc
r.popin.cc
The following URL allows the following requests to be made.
http://cdn.popin.cc/test/pc.html
[Request]
http://api.popin.cc/searchbox/popin_test.js
http://api.popin.cc/popin_discovery5-min.js
https://discoveryplus.popin.cc/popin_discovery/ck
https://discoveryplus.popin.cc/popin_discovery/recommend
https://rlog.popin.cc/s.gif
http://r.popin.cc/log.gif
- Eligible
For Bounty -
The following vulnerabilities are eligible to receive bounty reward.
(1) Remote Code Execution
(2) SQL Injection
(3) Authentication Bypass
(4) Cross-Site Scripting (XSS)
(5) Cross-Site Request Forgery (CSRF)
(6) Other - Not Eligible
For Bounty -
Reports related to the following issues are out-of-scope for this program.
(1) Vulnerabilities found through automated scans or tools.
(2) Hypothetical or theoretical vulnerabilities without actual verification code
(3) Vulnerabilities with capability of Denial of Service attack
(4) Vulnerabilities with capability of brute force against password or tokens
(5) Password, email and account policies, such as email id verification, reset link expiration, password complexity
(6) Login/Logout CSRF
(7) CSRF on forms that are available to anonymous users (e.g. contact form)
(8) Missing security headers
(9) Vulnerabilities found in domains out-of-scope
(10) Vulnerabilities affecting outdated browsers or platforms
(11) Presence of autocomplete attribute on web forms
(12) Missing secure flags on non-sensitive cookies
(13) Reports of insecure SSL/TLS ciphers
(14) Vulnerabilities with capability of username/email enumeration
(15) Descriptive error messages (e.g. Stack traces, application or server errors)
(16) Banner disclosure on servers
(17) Misconfiguration of SPF record, DMARC and DKIM
(18) Invalid HTTP method - Notes
Bounty Reward History
-
2016/06/13 14:38
¥5,000 (5 pts) was paid for niwasaki 's report
-
2016/06/13 14:35
¥10,000 (10 pts) was paid for Private 's report
-
2016/06/13 14:32
¥10,000 (10 pts) was paid for zuh4n 's report
-
2016/06/13 14:30
¥5,000 (5 pts) was paid for mage 's report
-
2016/06/13 14:27
¥10,000 (10 pts) was paid for shhnjk 's report
-
2016/06/13 14:27
¥5,000 (5 pts) was paid for seo 's report