Banner object (1)

Hack and Take the Cash !

800 bounties in database
  Back Link to program      
30/04/2019
firosolutions : Bug Bounty 2019 logo
Thanks
Gift
Hall of Fame
Reward

firosolutions : Bug Bounty 2019

computer$ ./bugbounty computer$ echo $RULES Do not submit any CSRF stuff We only have XL, Large, Medium and Small T-shirt sizes Only target in scope(bugbounty 00|01 .firosolutions.com) Do not DDOS infrastructure We define what is a vulnerability, we will not accept the lowest hanging fruit computer$ echo $IN_SCOPE bugbounty01.firosolutions.com - Webui bugbounty00.firosolutions.com - rest api | Read docs: https://github.com/FiroSolutions/api.firosolutions.com computer$ echo $SUBMIT Email us(bugbounty AT firosolutions DOT com) a TEXT file(.txt NOTHING ELSE, EVERYTHING ELSE WILL NOT BE OPENED) describing the vulnerability you found and a proof of concept of a successful exploit. If all is well and you found a bug, A tshirt awaits you, in the email please append an address where we can send the tshirts. Do not forget to add Country, City, address number, Zip code and Name in the address. computer$ echo $LENGTH The bug bounty ends once this site changes, We will have it up until all tshirts are gone computer$ echo $submitted_vulnerabilities -------------------------------------------------------- | | | 0: API-key generation vulnerability | | 1: POST inject vulnerability in submit field | | 2: input validation escaping | | | --------------------------------------------------------

FireBounty © 2015-2019

Legal notices