LINE

2019 Hall of fame

  1. 1. Hall of fame

    The following bugs were found and reported during the LINE Security Bug Bounty Program held from June 2. All of the following bugs were reviewed by LINE and selected for nomination to the Hall of Fame.
    No Profile Name Vulnerability
    1
    push0ebp
    https://twitter.com/push0ebp
    Cross-Site Scripting (XSS) - 5
    2
    $7 張啟元 智障駭客
    https://www.facebook.com/robots.tx
    Insecure Direct Object Reference(IDOR) - 1
    Cross-Site Scripting (XSS) - 1
    3
    mengyuan wan Authentication Bypass - 1
    4
    ryo
    https://twitter.com/m0d1f1er
    Improper Access Control - 1
    5
    ドマオー
    https://twitter.com/deep_omado
    Other - 1
    6
    Mohamed E. Azmy (stuxnite) Cross-Site Scripting (XSS) - 1
    7
    Oishi Akito
    https://twitter.com/66ed3gs
    Insecure Direct Object Reference(IDOR) - 1
    8
    heeeeen Other - 1
    9
    Dzmitry Lukyanenka
    https://www.vulnano.com
    Authentication Bypass - 1
    10
    k1tten
    https://twitter.com/k11tten
    Other - 1
  2. 2. Special Contributors

    The following participants reported bugs during the LINE Security Bug Bounty Program. The issues they uncovered were found to be outside the bounds of the program.
    However, the information provided by these participants contributed greatly to an increased level of security for the services offered by LINE.
    Accordingly, they have been selected as special contributors to the LINE Security Bug Bounty Program.
    No Name URL
    1 k1tten https://twitter.com/k11tten
    2 $7 張啟元 智障駭客 https://www.facebook.com/robots.tx
    3 Kaibro https://facebook.com/w181496
    4 Fadilah Agung N https://www.linkedin.com/in/fadilah-agung-nugraha-564971179/
    5 Todayisnew(Eric Head) http://www.codecancare.com
    6 splitline https://www.facebook.com/manage.py
    7 Domao https://twitter.com/deep_omado
    8 vtim https://www.facebook.com/vtim.py
    9 kazan71p https://twitter.com/kazan71p