BugBounty.jp

Program

Total Reports:41
Total Valid Reports:25

NETSEA

  Bounty Point
Program
NETSEA
Program Logo
Program Logo
Period
2016/12/06 〜 2017/02/08
Bounty Range
¥5,000¥200,000
Rules
Only test for vulnerabilities on application stipulated in scope section. Any vulnerabilities reported on applications out-of-scope are not eligible for bounty rewards.

***************************************************************
This is a production environment. Please note the following things:

- Credit card payment processing is out-of-scope.
- Execution of critical confirmation process like purchase process shall be as minimum as possible.
- Repetitive processing with tools are prohibited.
- Actions and/or tests (including use of the vulnerabilities) that will impact the other end users are explicitly prohibited.

Failure to comply with the above rules may results in ineligibility for receiving bounty rewards.
***************************************************************

Any vulnerability test against domains out-of-scope are explicitly prohibited.

Any violation on the Terms of Service of the “BugBounty.jp” and/or performance of DoS (Denial of Service) attack or equivalent act that can degrade the performance of our service are also explicitly prohibited.
Scope
NETSEA
 http://www.netsea.jp/
Eligible
For Bounty
The following vulnerabilities are eligible to receive bounty reward.

(1) Remote Code Execution
(2) SQL Injection
(3) Authentication Bypass
(4) Cross-Site Scripting (XSS)
(5) Cross-Site Request Forgery (CSRF)
(6) Other

The following guidelines the bounty amount for in-scope vulnerabilities.
Please note that reward amounts may vary depending on the severity of the vulnerability reported.

(1) 〜 ¥200,000  Remote Code Execution
(2) 〜 ¥200,000  SQL Injection
(3) 〜 ¥100,000  Authentication Bypass
(4) 〜 ¥50,000  Cross-Site Scripting (XSS)
(5) 〜 ¥10,000  Cross-Site Request Forgery (CSRF)
(6) 〜 ¥5,000   Other
Not Eligible
For Bounty
Reports related to the following issues are out-of-scope for this program.

(1) Vulnerabilities found through automated scans or tools
(2) Hypothetical or theoretical vulnerabilities without actual verification code
(3) Vulnerabilities with capability of Denial of Service attack
(4) Vulnerabilities with capability of brute force against password or tokens
(5) Password, email and account policies, such as email id verification, reset link expiration, password complexity
(6) Login/Logout CSRF
(7) Missing CSRF tokens
(8) CSRF on forms that are available to anonymous users (e.g. contact form)
(9) Missing security headers
(10) Vulnerabilities found in domains out-of-scope
(11) Vulnerabilities affecting outdated browsers or platforms
(12) Presence of autocomplete attribute on web forms
(13) Missing secure flags on non-sensitive cookies
(14) Reports of insecure SSL/TLS ciphers
(15) Vulnerabilities with capability of username/email enumeration
(16) Descriptive error messages (e.g. Stack traces, application or server errors)
(17) Banner disclosure on servers
(18) Misconfiguration of SPF record, DMARC and DKIM
(19) Invalid HTTP method
Notes
For eligibility details, please refer to the "Terms of Service Article 4" of this site.
Not accepting reports

Bounty Reward History

  • 2017/01/12 13:17

    ¥5,000 (5 pts) was paid for uruma 's report

    報奨金 ポイント
  • 2017/01/12 13:15

    ¥5,000 (5 pts) was paid for uruma 's report

    報奨金 ポイント
  • 2017/01/12 13:14

    ¥5,000 (5 pts) was paid for たじんなべ<s>sss 's report

    報奨金 ポイント
  • 2017/01/12 13:12

    ¥10,000 (10 pts) was paid for Cy 's report

    報奨金 ポイント
  • 2017/01/12 13:08

    ¥5,000 (5 pts) was paid for たじんなべ<s>sss 's report

    報奨金 ポイント
  • 2017/01/12 13:04

    ¥50,000 (50 pts) was paid for Private 's report

    報奨金 ポイント
  • 2017/01/12 12:57

    ¥10,000 (10 pts) was paid for kusano 's report

    報奨金 ポイント
  • 2017/01/12 12:55

    ¥50,000 (50 pts) was paid for tbmnull 's report

    報奨金 ポイント
  • 2017/01/12 12:51

    ¥5,000 (5 pts) was paid for kusano 's report

    報奨金 ポイント
  • 2017/01/12 12:49

    ¥5,000 (5 pts) was paid for kusano 's report

    報奨金 ポイント
  • 2017/01/12 12:47

    ¥5,000 (5 pts) was paid for shhnjk 's report

    報奨金 ポイント
  • 2017/01/12 12:04

    ¥5,000 (5 pts) was paid for uruma 's report

    報奨金 ポイント
  • 2017/01/12 12:03

    ¥5,000 (5 pts) was paid for uruma 's report

    報奨金 ポイント
  • 2017/01/12 12:01

    ¥5,000 (5 pts) was paid for uruma 's report

    報奨金 ポイント
  • 2017/01/12 11:59

    ¥10,000 (10 pts) was paid for yujitounai 's report

    報奨金 ポイント
  • 2017/01/12 11:58

    ¥10,000 (10 pts) was paid for yujitounai 's report

    報奨金 ポイント
  • 2017/01/12 11:52

    ¥50,000 (50 pts) was paid for Private 's report

    報奨金 ポイント
  • 2017/01/12 11:46

    ¥50,000 (50 pts) was paid for shinkbr 's report

    報奨金 ポイント
  • 2017/01/12 11:36

    ¥5,000 (5 pts) was paid for sandeep 's report

    報奨金 ポイント
  • 2017/01/12 11:16

    ¥5,000 (5 pts) was paid for shhnjk 's report

    報奨金 ポイント
  • 2017/01/12 11:14

    ¥5,000 (5 pts) was paid for Private 's report

    報奨金 ポイント
  • 2017/01/12 11:10

    ¥5,000 (5 pts) was paid for kamikaze 's report

    報奨金 ポイント
  • 2017/01/12 11:07

    ¥100,000 (100 pts) was paid for sandeep 's report

    報奨金 ポイント
  • 2017/01/12 10:55

    ¥50,000 (50 pts) was paid for kusano 's report

    報奨金 ポイント
  • 2017/01/12 10:53

    ¥10,000 (10 pts) was paid for ooooooo_q 's report

    報奨金 ポイント
Not accepting reports

SynaBiz

Available Program:
0
Closed Program:
1
Bounties Range:
¥ 5,000¥ 200,000
Reward Type:
Bounty Point

Top Hackers

ALL RANKING