masikini.com Cross Site Scripting Vulnerability
Report ID: OBB-3995043
Security Researcher Dipu1A
Helped patch 17689 vulnerabilities
Received 9 Coordinated Disclosure badges
Received 63 recommendations
, a holder of 9 badges for responsible and coordinated disclosure, found Cross Site Scripting security vulnerability affecting masikini.com website and its users.
Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has:
      a. verified the vulnerability and confirmed its existence;
      b. notified the website operator about its existence.
Technical details of the vulnerability are currently hidden ("On Hold") to give the website operator/owner sufficient time to patch the vulnerability without putting any of its systems or users at risk. Once patched, vulnerability details can be publicly disclosed by the researcher in at least 30 days since the submission. If for a reason the vulnerability remains unpatched, the researcher may disclose vulnerability details only after 90 days since the submission.
Affected Website: | masikini.com |
Open Bug Bounty Program: | Create your bounty program now. It's open and free. |
Vulnerable Application: | [hidden until disclosure] |
Vulnerability Type: | XSS (Cross Site Scripting) / CWE-79 |
CVSSv3 Score: | [hidden until disclosure] |
Disclosure Standard: | Coordinated Disclosure based on ISO 29147 guidelines |
Discovered and Reported by: | Dipu1A
Helped patch 17689 vulnerabilities Received 9 Coordinated Disclosure badges Received 63 recommendations |
Remediation Guide: | OWASP XSS Prevention Cheat Sheet |
Coordinated Disclosure Timeline
Vulnerability Reported: | 21 November, 2024 02:53 GMT |
Vulnerability Verified: | 21 November, 2024 03:05 GMT |
Website Operator Notified: | 21 November, 2024 03:05 GMT |
a. Using the ISO 29147 guidelines | |
b. Using publicly available security contacts | |
c. Using Open Bug Bounty notification framework | |
d. Using security contacts provided by the researcher | |
Public Report Published [without technical details]: | 21 November, 2024 03:05 GMT |
Scheduled Public Disclosure: A security researcher can delete the report before public disclosure, afterwards the report cannot be deleted or modified anymore. The researcher can also postpone public disclosure date as long as reasonably required to remediate the vulnerability. | 19 February, 2025 02:53 GMT |
For Website Operators and Owners
Please read how Open Bug Bounty helps make your websites secure and then contact the researcher directly to get the vulnerability details. The researcher may also help you fix the vulnerability and advice on how to prevent similar issues:
For remediation best practices, please also refer to OWASP remediation guidelines. More information about coordinate and responsible disclosure on Open Bug Bounty is available here.
DISCLAIMER: Open Bug Bounty is a non-profit project, we never act as an intermediary between website owners and security researchers. We have no relationship or control over the researchers. Our role is limited to independent verification of the submitted reports and proper notification of website owners by all reasonably available means.
masikini.com
Website Overview and Rating
SSL/TLS Server Test: | A+ View Results |
Web Server Security Test: | C View Results |
Malware Test: | Click here |
Domain Health Report: | Click here |
Latest Submissions
OBB-ID | Reported by | Status | Reported on |
On Hold
|
21.11.2024
|
||
On Hold
|
02.10.2024
|
||
patched
|
21.11.2017
|
||
patched
|
02.01.2017
|