Coordinated Disclosure Vulnerability
This vulnerability was reported via our coordinated disclosure Open Bug Bounty program and patched.
This vulnerability was reported via our coordinated disclosure Open Bug Bounty program and patched.
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
25.12.2020 by _Y000_ How to bypass mod_security (WAF) |
10.12.2020 by _Y000_ sql injection to bypass Mod_Security |
10.12.2020 by _Y000_ Create encoded sql payloads |
26.10.2020 by _r00t1ng_ Bypass Addslashes using Multibyte Character |
Thanks for finding a vulnerability on the website. Thanks to your tip, I could repair the issue and keep the website safe |
The team of CERT-rlp would like to thank Chirag Prajapati for a responsible and coordinated disclosure of vulnerabilities |
The team of CERT-rlp would like to thank EzioPaglia for a responsible and coordinated disclosure of vulnerabilities |
Thank you so much for suggesting the vulnerability. The prompt and detailed response helped solve the issues. |
Praveen was very helpful in providing information about a security issue in our site. With his help, we were able to correct eveything and keep our site safe. |