Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
586,710 coordinated disclosures
377,094 fixed vulnerabilities
896 bug bounties with 1,797 websites
18,218 researchers, 1185 honor badges

TU Chemnitz Bug Bounty Program

TU Chemnitz runs a bug bounty program to ensure the highest security and privacy of its websites. Everyone is eligible to participate in the program subject to the below-mentioned conditions and requirements of TU Chemnitz

Open Bug Bounty performs triage and verification of the submissions. However, we never intervene to the further process of vulnerability remediation and disclosure between TU Chemnitz and researchers.

Bug bounty program allow private and public submissions.

Bug Bounty Scope

The following websites are within the scope of the program:

*.tu-chemnitz.de

Non-Intrusive Submissions Handling

The following section encompasses submission of the vulnerabilities that do not require intrusive testing as per Open Bug Bounty rules:

- Cross Site Scripting (XSS)
- Open Redirect

- Cross Site Request Forgery (CSRF)
- Improper Access Control

General Requirements:

No general requirements

Testing Requirements:

No testing requirements

Possible Awards:

No possible awards

Community Rating

Provided by security researchers who reported security vulnerabilities via this bug bounty program:

 
Response Time  Information How quickly researchers get responses to their submissions.
Remediation Time  Information How quickly reported submissions are fixed.
Cooperation and Respect  Information How fairly and respectfully researchers are being treated.

Researcher's comments

No comments so far.

  Latest Patched

 26.09.2020 iprice.my
 26.09.2020 ibisingold.me
 26.09.2020 mania.kr
 26.09.2020 grin.com
 26.09.2020 uh.edu
 26.09.2020 mangaseeonline.us
 26.09.2020 codeproject.com
 26.09.2020 ecartelera.com
 26.09.2020 gamemodding.com
 25.09.2020 wordplays.com

  Latest Blog Posts

14.09.2020 by aninda_anon
VPS Cheatsheet for bug hunting
14.09.2020 by pk_12397
A Story of IDOR To Account Takeover
14.09.2020 by febin_rev
How to find valid and impactful CSRFs
14.09.2020 by _r00t1ng_
Using {XSS} to play games on Site
24.06.2020 by Gkexamquiz
How to Find Contacts To Report Bugs & Security Vulnerabilities | Bug Bounty Tutorials 2020

  Recent Recommendations

@s3cguy1     25 September, 2020
    Twitter s3cguy1:
Really appreciate the way that this was disclosed. Researcher was courteous and very helpful.

Thanks!
@MalagaCarCom     25 September, 2020
    Twitter MalagaCarCom:
Found a dangerous injection vulnerability. Solved now, thank you!
@trippingflags     24 September, 2020
    Twitter trippingflags:
Thanks for highlighting this issue for us and also for re-testing it once we patched it. :)
@rus_cert     24 September, 2020
    Twitter rus_cert:
Thank you for your very detailed and helpful reports :-)
@TinNguy54963117     23 September, 2020
    Twitter TinNguy54963117:
Thank you for the accurate and quick response in disclosing our vulnerability. This was done in a professional and responsible manner through the bug bounty program, giving us time to remediate.