LY Corporation

Notice

From November 2019 the LINE Security Bug Bounty Program moved to HackerOne. This page will no longer be updated, but will be kept to show our gratitude to hackers who have contributed to our program. You can find our new Hall of Fame on our HackerOne Program page.

2017 Hall of fame

  1. 1. Hall of fame

    The following bugs were found and reported during the LINE Security Bug Bounty Program held from June 2. All of the following bugs were reviewed by LY Corporation and selected for nomination to the Hall of Fame.
    No Profile Name Vulnerability
    1
    Ron Chan
    https://twitter.com/ngalongc
    Authentication Bypass - 2
    Other -  2
    Cross-Site Scripting (XSS) - 1
    2
    Muhammad Junaid ( An0n J# )
    https://twitter.com/snoviboy
    Remote Code Execution - 1
    Other - 1
    3
    $7
    https://www.facebook.com/robots.tx
    Purchase Bypass - 1
    Cross-Site Scripting (XSS) - 3
    4
    adm1nkyj(Yongjin Kim)
    http://adm1nkyj.kr
    Cross-Site Scripting (XSS) - 2
    5
    Masato Kinugawa
    https://twitter.com/kinugawamasato
    Cross-Site Scripting (XSS) - 2
    6
    Isobe and Minematsu
    https://sites.google.com/view/takanoriisobe http://www.nec.com/en/global/rd/crl/rdmembers/
    members/profile_minematsu.html
    Encryption Break - 1
    7
    Arrch
    https://www.linkedin.com/in/arrch/
    Cross-Site Scripting (XSS) - 1
    Cross-Site Request Forgery (CSRF) - 1
    Other - 1
    8
    Spam404
    https://twitter.com/spam404online/
    Cross-Site Scripting (XSS) - 1
    9
    高敏睿 (Mico)
    https://www.facebook.com/Micoder
    Cross-Site Scripting (XSS) - 1
    10
    YSc
    https://ysc21.github.io/
    Cross-Site Scripting (XSS) - 1
    11
    brdoors
    https://twitter.com/cecleandro
    Other - 1
  2. 2. Special Contributors

    The following participants reported bugs during the LINE Security Bug Bounty Program. The issues they uncovered were found to be outside the bounds of the program.
    However, the information provided by these participants contributed greatly to an increased level of security for the services offered by LY Corporation.
    Accordingly, they have been selected as special contributors to the LINE Security Bug Bounty Program.
    No Name URL
    1 Bilal Abdussalam https://facebook.com/BillFesbuk
    2 Caner Köroğlu https://twitter.com/cnrkrglu
    3 Pichaya Morimoto (SEC Consult Vulnerability Lab) https://www.sec-consult.com/
    4 Hanno Böck https://hboeck.de/
    5 Masato Kinugawa https://twitter.com/kinugawamasato
    6 MEET SHAH https://www.linkedin.com/in/meet-shah-4228057b/
    7 Hammad Shamsi https://twitter.com/hammadshamsii
    8 MalangCyberCrew https://hackerone.com/arrch
    9 CodeCanCare https://www.codecancare.com
    10 ahmed hassan http://ahmed.nyc
    11 Indonesian Coder http://indonesiancoder.com/
    12 vishnu https://www.facebook.com/vishnu0002
    13 Honc (章哲瑜) https://www.facebook.com/you.toshoot
    14 Hisham https://securitywall.co/
    15 Spam404 https://twitter.com/spam404online/
    16 Taien Wang https://www.facebook.com/taien.tw
    17 Bastian Welfrid Purba https://www.twitter.com/bastianwelfrid
    18 YoKo Kho https://twitter.com/YoKoAcc
    19 黃詩凱(Kaibro) https://www.facebook.com/w181496
    20 k1tten https://www.plurk.com/k11tten
    21 Leandro Chaves https://twitter.com/cecleandro
    22 Bill Ben Haim https://www.linkedin.com/in/bill-ben-haim-b6775a48/