Program

Phantom of the Kill

¥

P

Total Reports 17

Total Valid Reports 13

  • Program
    Phantom of the Kill
    Report Submission Period
    2016/08/01 〜 2016/09/30
    Total Bounties
    ¥2,000,000
    Bounty Range
    ¥5,000¥300,000
    Rules
    Only test for vulnerabilities on application stipulated in scope section. Any vulnerabilities reported on applications out-of-scope are not eligible for bounty rewards.

    ***************************************************************
    「Phantom of the Kill」is the global version application.
    Do not perform any tests against the Japanese version of「Phantom of the
    Kill」application.
    ***************************************************************

    Any vulnerability test against domains out-of-scope are explicitly prohibited.

    Any violation on the Terms of Service of the “BugBounty.jp” and/or performance of DoS (Denial of Service) attack or equivalent act that can degrade the performance of our service are also explicitly prohibited.
    Scope
    ◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆
     Phantom of the Kill
    ◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆◆

     ・Android
      https://play.google.com/store/apps/details?id=jp.co.gu3.punkww
     ・iOS
      https://itunes.apple.com/nz/app/phantom-of-the-kill/id1033446712

     The following domain URL connect with application.
     punkww-dlc.gu3.jp
    Eligible For Bounty
    The following vulnerabilities are eligible to receive bounty reward.

    (1) Remote Code Execution
    (2) Billing System Bypass
    (3) SQL Injection
    (4) Authentication Bypass
    (5) Cheating
    (6) Cross-Site Scripting (XSS)
    (7) Cross-Site Request Forgery (CSRF)
    (8) Other

    The following guidelines the bounty amount for in-scope vulnerabilities.
    Please note that reward amounts may vary depending on the severity of the vulnerability reported.

    (1) ¥300,000     Remote Code Execution
    (2) ¥200,000     Billing System Bypass
    (3) ¥150,000     SQL Injection
    (4) ¥100,000     Authentication Bypass
    (5) ¥50,000 - ¥5,000 Cheating  
    (6) ¥10,000      Cross-Site Scripting (XSS)
    (7) ¥5,000       Cross-Site Request Forgery (CSRF)
    (8) ¥5,000       Other
    Not Eligible For Bounty
    Reports related to the following issues are out-of-scope for this program.

    (1) Vulnerabilities found through automated scans or tools
    (2) Hypothetical or theoretical vulnerabilities without actual verification code
    (3) Vulnerabilities with capability of Denial of Service attack
    (4) Vulnerabilities with capability of brute force against password or tokens
    (5) Password, email and account policies, such as email id verification, reset link expiration, password complexity
    (6) Login/Logout CSRF
    (7) Missing CSRF tokens
    (8) CSRF on forms that are available to anonymous users (e.g. contact form)
    (9) Missing security headers
    (10) Vulnerabilities found in domains out-of-scope
    (11) Vulnerabilities affecting outdated browsers or platforms
    (12) Presence of autocomplete attribute on web forms
    (13) Missing secure flags on non-sensitive cookies
    (14) Reports of insecure SSL/TLS ciphers
    (15) Vulnerabilities with capability of username/email enumeration
    (16) Descriptive error messages (e.g. Stack traces, application or server errors)
    (17) Banner disclosure on servers
    (18) Misconfiguration of SPF record, DMARC and DKIM
    (19) Invalid HTTP method
    Notes
    For eligibility details, please refer to the "Terms of Service Article 4" of this site.
    • paid for seo 's report
      granted for seo 's report
      2016/10/25 18:44

    • paid for seo 's report
      granted for seo 's report
      2016/10/25 18:44

    • paid for uruma 's report
      granted for uruma 's report
      2016/10/25 18:43

    • paid for seo 's report
      granted for seo 's report
      2016/06/16 12:53

    • paid for Techbrunch 's report
      granted for Techbrunch 's report
      2016/04/22 21:01

    • paid for Paresh 's report
      granted for Paresh 's report
      2016/04/22 20:58

    • paid for seo 's report
      granted for seo 's report
      2016/04/22 20:07

    • paid for seo 's report
      granted for seo 's report
      2016/04/22 20:06

    • paid for seo 's report
      granted for seo 's report
      2016/04/22 20:06

    • paid for seo 's report
      granted for seo 's report
      2016/04/22 20:05

    • paid for Private 's report
      granted for Private 's report
      2016/04/22 20:04

    • paid for seo 's report
      granted for seo 's report
      2016/04/22 20:03

    • paid for seo 's report
      granted for seo 's report
      2016/04/22 19:33