Coordinated Disclosure Vulnerability
This vulnerability was reported via our coordinated disclosure Open Bug Bounty program and patched.
This vulnerability was reported via our coordinated disclosure Open Bug Bounty program and patched.
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
25.12.2020 by _Y000_ How to bypass mod_security (WAF) |
10.12.2020 by _Y000_ sql injection to bypass Mod_Security |
10.12.2020 by _Y000_ Create encoded sql payloads |
26.10.2020 by _r00t1ng_ Bypass Addslashes using Multibyte Character |
Rajesh was very helpful in providing information and penetration testing on our site. With this information, we were able to harden our infrastructure. |
Hi Praveen, Thanks for the help with the vulnerability. Very fast and friendly contact. |
We had no idea that this vulnerability existed in many PHP-based websites and you kindly reported it to us. Thanks for your help and all the best for your career! |
Thank you very much for informing us about our access vulnerability! The world needs more good guys like you! A+! |
Specialist in web application penetration tester, student and passionate about computer security and ethical hacking. |