Banner object (1)

Hack and Take the Cash !

815 bounties in database
  Back Link to program      
People Interactive logo
Hall of Fame

People Interactive

No technology is perfect, and People Interactive believes that working with skilled security researchers across the globe is crucial in identifying weaknesses in any technology. If you believe you've found a security issue in our product or service, we encourage you to notify us. We welcome working with you to resolve the issue promptly.

Disclosure Policy

  • Let us know as soon as possible upon discovery of a potential security issue, and we'll make every effort to quickly resolve the issue.
  • Provide us a reasonable amount of time to resolve the issue before any disclosure to the public or a third-party.
  • Make a good faith effort to avoid privacy violations, destruction of data, and interruption or degradation of our service. Only interact with accounts you own or with explicit permission of the account holder.


While researching, we'd like to ask you to refrain from:

  • Denial of service
  • Spamming
  • Social engineering (including phishing) of People Interactive staff or contractors
  • Any physical attempts against People Interactive property or data centers
  • Attacks dependent upon social engineering
  • Attacks requiring physical access to a user's device
  • Attacks requiring physical access to device or MiTM
  • An attacker in a Man-in-the-Middle
  • CSRF (Cross Site Request Forgery)
  • XSS (Cross Site Scripting)
  • Host Header Injection
  • Content spoofing/text injection
  • Hyperlink injection in emails using forms available to any user
  • Clickjacking
  • Contact information of the member received via any front-end feature working as desired e.g. a type of premium membership may allow free members to access to premium contact details.
  • Disclosure of known public files or directories
  • Enforcement policies for brute force or account lockout
  • Password and account recovery policies
  • Issues related to active sessions after password changes.
  • Mail configuration issues including SPF, DKIM, DMARC settings
  • Mixed content issues
  • HTTP method enabled
  • Outdated software/library versions
  • Presence of autocomplete functionality in form fields
  • Publicly accessible login panels
  • Rate-limiting issues / Insufficient Anti-Automation
  • Descriptive error messages or headers (e.g. Stack Traces, application or server errors, banner grabbing)
  • Cookies that lack HTTP Only or Secure settings for non-sensitive data
  • Missing security headers without additional details or a POC demonstrating a specific exploit
  • SSL/TLS best practices
  • Use of a known-vulnerable library without a description of an exploit specific to our implementation
  • Username enumeration based on login or forgot password pages
  • Reports from automated tools or scans
  • Jailbreak Detection or Root Detection in case of Mobile Applications
  • SSL Pinning in case of Mobile Applications

Safe Harbor

Any activities conducted in a manner consistent with this policy will be considered authorized conduct and we will not initiate legal action against you. If legal action is initiated by a third party against you in connection with activities conducted under this policy, we will take steps to make it known that your actions were conducted in compliance with this policy.

Thank you for helping keep People Interactive and our users safe!

In Scope

Scope Type Scope Name








This programe feature scope type like web_application, android_application, ios_application.

FireBounty © 2015-2019

Legal notices