Open Bug Bounty ID: OBB-1155335
Security Researcher geeknik Helped patch 8815 vulnerabilities
Received 8 Coordinated Disclosure badges
Received 20 recommendations , a holder of 8 badges for responsible and coordinated disclosure, found a security vulnerability affectingyearcast.com website and its users.
Following coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has:
      a. verified the vulnerability and confirmed its existence;
      b. notified the website operator about its existence.
Technical details of the vulnerability are currently hidden (“On Hold”) to give website operator/owner sufficient time to patch the vulnerability without putting any of its systems or users at risk. Once patched, vulnerability details can be publicly disclosed by the researcher in at least 30 days since the submission. If for a reason the vulnerability remains unpatched, its details can be disclosed only 90 days.
Affected Website: | yearcast.com |
---|---|
Open Bug Bounty Program: | Create your bounty program now. It’s open and free. |
Vulnerable Application: | [hidden until disclosure] |
Vulnerability Type: | IAC (Improper Access Control) / CWE-284 |
CVSSv3 Score: | [hidden until disclosure] |
Disclosure Standard: | Coordinated Disclosure based on ISO 29147 guidelines |
Discovered and Reported by: | **geeknik Helped patch 8815 vulnerabilities |
Received 8 Coordinated Disclosure badges | |
Received 20 recommendations ** | |
Remediation Guide: | OWASP Access Control Cheat Sheet |
Vulnerability Reported: | 3 May, 2020 20:28 GMT |
---|---|
Vulnerability Verified: | 4 May, 2020 08:17 GMT |
Website Operator Notified: | 4 May, 2020 08:17 GMT |
a. Using the ISO 29147 guidelines | ![]() |
— | — |
b. Using publicly available security contacts | ![]() |
c. Using Open Bug Bounty notification framework | ![]() |
d. Using security contacts provided by the researcher | ![]() |
Public Report Published | |
[without any technical details]: | 4 May, 2020 08:17 GMT |
Scheduled Public Disclosure: ![]() |
1 August, 2020 20:28 GMT |
— | — |