stud.kz Cross Site Scripting Vulnerability
Report ID: OBB-583262
Security Researcher JohnDoe
Helped patch 2456 vulnerabilities
Received 7 Coordinated Disclosure badges
Received 34 recommendations
, a holder of 7 badges for responsible and coordinated disclosure, found Cross Site Scripting security vulnerability affecting stud.kz website and its users.
Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has:
      a. verified the vulnerability and confirmed its existence;
      b. notified the website operator about its existence.
Affected Website: | stud.kz |
Open Bug Bounty Program: | View Open Bug Bounty Program |
Vulnerable Application: | Custom Code |
Vulnerability Type: | XSS (Cross Site Scripting) / CWE-79 |
CVSSv3 Score: | 6.1 [CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N] |
Disclosure Standard: | Coordinated Disclosure based on ISO 29147 guidelines |
Discovered and Reported by: | JohnDoe
Helped patch 2456 vulnerabilities Received 7 Coordinated Disclosure badges Received 34 recommendations |
Remediation Guide: | OWASP XSS Prevention Cheat Sheet |
Export Vulnerability Data: | Bugzilla Vulnerability Data JIRA Vulnerability Data [ Configuration ] Mantis Vulnerability Data Splunk Vulnerability Data XML Vulnerability Data [ XSD ] |
Vulnerable URL:
Mirror: Click here to view the mirror
Coordinated Disclosure Timeline
Vulnerability Reported: | 20 March, 2018 10:54 GMT |
Vulnerability Verified: | 20 March, 2018 11:01 GMT |
Website Operator Notified via Bug Bounty: | 20 March, 2018 11:01 GMT |
Public Report Published [without technical details]: | 20 March, 2018 11:01 GMT |
Public Disclosure: A security researcher can delete the report before public disclosure, afterwards the report cannot be deleted or modified anymore. The researcher can also postpone public disclosure date as long as reasonably required to remediate the vulnerability. | 18 June, 2018 10:54 GMT |
For Website Operators and Owners
Please read how Open Bug Bounty helps make your websites secure and then contact the researcher directly to get the vulnerability details. The researcher may also help you fix the vulnerability and advice on how to prevent similar issues:
For remediation best practices, please also refer to OWASP remediation guidelines. More information about coordinate and responsible disclosure on Open Bug Bounty is available here.
DISCLAIMER: Open Bug Bounty is a non-profit project, we never act as an intermediary between website owners and security researchers. We have no relationship or control over the researchers. Our role is limited to independent verification of the submitted reports and proper notification of website owners by all reasonably available means.
stud.kz
Website Overview and Rating
The website stud.kz is part of a bug bounty program run by stud.kz company:
SSL/TLS Server Test: | A+ View Results |
Web Server Security Test: | N/A View Results |
Malware Test: | Click here |
Domain Health Report: | Click here |
Latest Submissions
OBB-ID | Reported by | Status | Reported on |
On Hold
|
26.11.2024
|
||
patched
|
07.09.2024
|
||
patched
|
04.09.2024
|
||
patched
|
02.09.2024
|
||
unpatched
|
11.03.2019
|
||
unpatched
|
20.03.2018
|