From November 2019 the LINE Security Bug Bounty Program moved to HackerOne. This page will no longer be updated, but will be kept to show our gratitude to hackers who have contributed to our program. You can find our new Hall of Fame on our HackerOne Program page.
1. Hall of fame
The following bugs were found and reported during the LINE Security Bug Bounty Program held from June 2. All of the following bugs were reviewed by LINE and selected for nomination to the Hall of Fame.No | Profile | Name | Vulnerability |
---|---|---|---|
1 | ![]() |
Ron Chan https://twitter.com/ngalongc |
Authentication Bypass - 2 Other - 2 Cross-Site Scripting (XSS) - 1 |
2 | ![]() |
Muhammad Junaid ( An0n J# ) https://twitter.com/snoviboy |
Remote Code Execution - 1 Other - 1 |
3 | ![]() |
$7 https://www.facebook.com/robots.tx |
Purchase Bypass - 1 Cross-Site Scripting (XSS) - 3 |
4 | ![]() |
adm1nkyj(Yongjin Kim) http://adm1nkyj.kr |
Cross-Site Scripting (XSS) - 2 |
5 | ![]() |
Masato Kinugawa https://twitter.com/kinugawamasato |
Cross-Site Scripting (XSS) - 2 |
6 | ![]() |
Isobe and Minematsu https://sites.google.com/view/takanoriisobe http://www.nec.com/en/global/rd/crl/rdmembers/ members/profile_minematsu.html |
Encryption Break - 1 |
7 | ![]() |
Arrch https://www.linkedin.com/in/arrch/ |
Cross-Site Scripting (XSS) - 1 Cross-Site Request Forgery (CSRF) - 1 Other - 1 |
8 | ![]() |
Spam404 https://twitter.com/spam404online/ |
Cross-Site Scripting (XSS) - 1 |
9 | ![]() |
高敏睿 (Mico) https://www.facebook.com/Micoder |
Cross-Site Scripting (XSS) - 1 |
10 | ![]() |
YSc https://ysc21.github.io/ |
Cross-Site Scripting (XSS) - 1 |
11 | ![]() |
brdoors https://twitter.com/cecleandro |
Other - 1 |
2. Special Contributors
The following participants reported bugs during the LINE Security Bug Bounty Program. The issues they uncovered were found to be outside the bounds of the program.