45466 policies in database
Link to program      
2018-04-11
2019-09-26
Hamamatsu City Official website logo
Thank
Gift
HOF
Reward

Hamamatsu City Official website

Rules

Only test for vulnerabilities on web application stipulated in scope section. Any vulnerabilities reported on web applications out-of-scope are not eligible for bounty rewards.


Rewards for this program are points only. There is no monetary reward.

Any performance of DoS (Denial of Service) attack or equivalent act that can degrade the performance of our service are explicitly prohibited.

This is a production environment, posts to the “CONTACT FORM” or “FEEDBACK” are only allowed on forms that “PUBLIC OPNION AND RELATIONS DIVISION” are in charge, and should be not posted more than necessary to perform the test. When posting to the “CONTACT FORM” please use 「SecurityTest」 to indicate you are performing the test.

Example: The division in charge of the forms are described in the bottom of the page. Only forms that “PUBLIC OPNION AND RELATIONS DIVISION” are in charge are allowed to post.

https://www.city.hamamatsu.shizuoka.jp/shise/koho/koho/hamamatsu/index.html

To be eligible for a bounty reward under this program you must to follow the rules stipulated above.


Any vulnerability test against domains out-of-scope are explicitly prohibited.

Any violation on the Terms of Service of the “BugBounty.jp” and/or performance of DoS (Denial of Service) attack or equivalent act that can degrade the performance of our service are also explicitly prohibited.

Scope

The following web applications are in-scope for this program.

Hamamatsu City Official website

https://www.city.hamamatsu.shizuoka.jp/

The following domain URL connect with web application.

www.city.hamamatsu.shizuoka.jp ### Eligible For Bounty


Rewards for this program are points only. There is no monetary reward.


The following vulnerabilities are eligible to receive bounty reward.

(1) Remote Code Execution

(2) SQL Injection

(3) Authentication Bypass

(4) Cross-Site Scripting (XSS)

(5) Cross-Site Request Forgery (CSRF)

(6) Other

Not Eligible For Bounty

Reports related to the following issues are out-of-scope for this program.

(1) Vulnerabilities found through automated scans or tools

(2) Hypothetical or theoretical vulnerabilities without actual verification code

(3) Vulnerabilities with capability of Denial of Service attack

(4) Vulnerabilities with capability of brute force against password or tokens

(5) Password, email and account policies, such as email id verification, reset link expiration, password complexity

(6) Missing CSRF tokens

(7) CSRF on forms that are available to anonymous users (e.g. contact form)

(8) Missing security headers

(9) Vulnerabilities found in domains out-of-scope

(10) Vulnerabilities affecting outdated browsers or platforms

(11) Presence of autocomplete attribute on web forms

(12) Missing secure flags on non-sensitive cookies

(13) Reports of insecure SSL/TLS ciphers

(14) Vulnerabilities with capability of username/email enumeration

(15) Descriptive error messages (e.g. Stack traces, application or server errors)

(16) Banner disclosure on servers

(17) Misconfiguration of SPF record, DMARC and DKIM

(18) Invalid HTTP method ### Notes

For eligibility details, please refer to the "Terms of Service Article 4" of this site.

In Scope

Scope Type Scope Name
web_application

www.city.hamamatsu.shizuoka.jp


This program crawled on the 2018-04-11 is sorted as bounty.

FireBounty © 2015-2024

Legal notices | Privacy policy