LINE

2018 Hall of fame

  1. 1. Hall of fame

    The following bugs were found and reported during the LINE Security Bug Bounty Program held from June 2. All of the following bugs were reviewed by LINE and selected for nomination to the Hall of Fame.
    No Profile Name Vulnerability
    1
    Tomonori Shiomi Remote Code Execution - 1
    Cross-Site Scripting (XSS) - 1
    2
    Orange Tsai(@orange_8361)
    http://blog.orange.tw/
    Insecure Direct Object Reference(IDOR) - 1
    Cross-Site Scripting (XSS) - 2
    Improper Access Controle - 1
    3
    Masato Kinugawa
    https://twitter.com/kinugawamasato
    Cross-Site Scripting (XSS) - 4
    4
    Yuhei Yamauchi
    https://twitter.com/x0Y14
    Other - 2
    Purchase Bypass - 2
    Authentication Bypass - 1
    Cross-Site Scripting (XSS) - 1
    5
    bagipro(Sergey Toshin)
    Other - 4
    6
    Paolo Montesel (babush)
    https://twitter.com/pmontesel
    Other -  1
    7
    $7 張啟元 智障駭客
    https://www.facebook.com/robots.tx
    Authentication Bypass - 1
    8
    Ron Chan
    https://twitter.com/ngalongc
    Cross-Site Scripting (XSS) - 1
    Cross-Site Request Forgery (CSRF) - 1
    Other -  2
    9
    Dzmitry Lukyanenka
    http://www.vulnano.com
    Authentication Bypass - 1
    10
    harisec(Bogdan Calin)
    https://twitter.com/har1sec
    Other - 1
    11
    https://twitter.com/f3o23rkf Other - 1
    Cross-Site Scripting (XSS) - 1
    12
    apktest Other - 1
    13
    adm1nkyj(Yongjin Kim)
    http://adm1nkyj.kr
    Cross-Site Scripting (XSS) - 2
    14
    f3ci(marie)
    https://www.linkedin.com/in/mariemuhammad/
    Other - 1
    15
    brdoors
    https://twitter.com/cecleandro
    Other - 1
    16
    人生の過客 YinMo
    Other - 1
  2. 2. Special Contributors

    The following participants reported bugs during the LINE Security Bug Bounty Program. The issues they uncovered were found to be outside the bounds of the program.
    However, the information provided by these participants contributed greatly to an increased level of security for the services offered by LINE.
    Accordingly, they have been selected as special contributors to the LINE Security Bug Bounty Program.
    No Name URL
    1 Orange Tsai http://blog.orange.tw/
    2 $7(張啟元) https://www.facebook.com/robots.tx
    3 Alex Bastrakov (kazan71p) https://twitter.com/kazan71p
    4 atestpk -
    5 csanuragjain(Anurag Jain) https://twitter.com/csanuragjain
    6 adm1nkyj(yongjin kim) http://adm1nkyj.kr/
    7 - https://twitter.com/f3o23rkf​
    8 Todayisnew(Eric Head) http://www.codecancare.com
    9 ngalongc https://twitter.com/ngalongc
    10 Eusebiu Blindu https://twitter.com/testalways
    11 Nov Matake https://matake.jp
    12 cHackmate https://www.twitter.com/iambharat18
    13 Dzmitry Lukyanenka http://www.vulnano.com
    14 Dan DoRego https://twitter.com/alter_labs
    15 Kdiag Haci https://www.facebook.com/kdiag.haci
    16 Honc (章哲瑜) https://twitter.com/honcbb
    17 Yeasir Arafat https://www.facebook.com/skylinearafat.arafat
    18 Yusuke Takamatsu https://jp.linkedin.com/in/yusuke-takamatsu-86312391
    19 Shivam Krishan Sharma https://www.linkedin.com/in/shivamkrishansharma/