Coordinated Disclosure Vulnerability
This vulnerability was reported via our coordinated disclosure Open Bug Bounty program and patched.
This vulnerability was reported via our coordinated disclosure Open Bug Bounty program and patched.
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
15.02.2022 by sepkatpro Ultimate XSS Polyglot |
08.10.2021 by NNeuchi How I Found My First Bug Reflected Xss On PIA.GOV.PH(Philippine Information Agency) |
26.08.2021 by PyaePhyoThu98 eG Manager v7.1.2: Improper Access Control lead to Remote Code Execution (CVE-2020-8591) |
14.07.2021 by Open Bug Bounty Interview With Open Bug Bounty |
NoOne_369 made us aware of several security vulnerabilities that represented security flaws of several degrees and needed to be rectified. It was a pleasure working with you and I hope we can work again in the future, Thank you! |
Thanks to Ravi for the responsible vulnerability reporting and the professional communication, we recommend him for sure. Thank you! |
@singhnitesh21 provides precise and comprehensive vulnerable information. I highly appreciate the support and quick response. |
The team of CERT-rlp would like to thank Antonio for a responsible and coordinated disclosure of vulnerabilities |
Appreciate the skill and effort Nitesh and others in the open bounty, ethical hacker community bring to the table. He pointed out an XSS vulnerability on our website. |