BugBounty.jp

Program

Total Reports:21
Total Valid Reports:4

THE ZERO/ONE

  Bounty Point
Program
THE ZERO/ONE
Cyber Security & Intelligence Media, a media outlet specialized in cybersecurity
Program Logo
Program Logo
Period
2015/12/09 〜 2018/12/31
Total Bounties
¥3,000,000
Bounty Range
¥5,000¥500,000
Rules
Sprout have prepared verification environment to perform tests. Perform tests only against verification environment.
Reports of test performed outside of verification environment are not eligible for bounty rewards.
Only functions available to researchers are in-scope for the BugBounty website.
Scope
Web application
Name
サイバーセキュリティ・メディア『THE ZERO/ONE』
URL
  • https://pt-the01.bugbounty.jp/
Domain
  • pt-the01.bugbounty.jp
Eligible
For Bounty
  • Remote Code Execution up to 264,000yen
  • Authentication up to 243,000yen
  • SQL Injection up to 228,000yen
  • Cross-Site Scripting up to 54,000yen
  • Cross-Site Request Forgery (CSRF) up to 18,000yen
  • other up to 1,000yen
  • Not Eligible
    For Bounty
  • Vulnerabilities found through automated scans or tools
  • Hypothetical or theoretical vulnerabilities without actual verification code
  • Vulnerabilities with capability of Denial of Service attack
  • Vulnerabilities with capability of brute force against password or tokens
  • Password, email and account policies, such as email id verification, reset link expiration, password complexity
  • Login/Logout CSRF
  • Missing CSRF tokens
  • CSRF on forms that are available to anonymous users (e.g. contact form)
  • Missing security headers
  • Vulnerabilities found in domains out-of-scope
  • Vulnerabilities affecting outdated browsers or platforms
  • Presence of autocomplete attribute on web forms
  • Missing secure flags on non-sensitive cookies
  • Reports of insecure SSL/TLS ciphers
  • Vulnerabilities with capability of username/email enumeration
  • Descriptive error messages (e.g. Stack traces, application or server errors)
  • Banner disclosure on servers
  • Misconfiguration of SPF record, DMARC and DKIM
  • Invalid HTTP method
  • Text Injection
  • Notes
    To participate in this Bug Bounty Program, you must satisfy the following requirements:

    (1) You have never carried out any project related with Sprout Inc.

    For eligibility other than listed above, please refer to the "Terms of Service Article 4" of this site.
    Not accepting reports

    Bounty Reward History

    • 2018/01/12 10:00

      ¥5,000 (5 pts) was paid for mage 's report

      報奨金 ポイント
    • 2017/03/24 18:31

      ¥5,000 (5 pts) was paid for Rey Mark Divino 's report

      報奨金 ポイント
    • 2017/03/02 14:38

      ¥5,000 (5 pts) was paid for Private 's report

      報奨金 ポイント
    Not accepting reports

    Sprout

    Available Program:
    1
    Closed Program:
    1
    Bounties Range:
    ¥ 1,000¥ 500,000
    Reward Type:
    Bounty Point

    Top Hackers

    ALL RANKING