Coordinated Disclosure Vulnerability
This vulnerability was reported via our coordinated disclosure Open Bug Bounty program and patched.
This vulnerability was reported via our coordinated disclosure Open Bug Bounty program and patched.
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
25.12.2020 by _Y000_ How to bypass mod_security (WAF) |
10.12.2020 by _Y000_ sql injection to bypass Mod_Security |
10.12.2020 by _Y000_ Create encoded sql payloads |
26.10.2020 by _r00t1ng_ Bypass Addslashes using Multibyte Character |
Thanks for finding the XML-RPC security issue on the website of our customer. I will keep this in mind for future projects. You help to make the internet safer. Good luck for your further tech career. |
Thank you for pointing out the Click Jacking issue. The vulnerability has been fixed. Appreciate it! |
Thanks for finding an XSS flaw. We have also implemented the advice with the referrer header. Best regards and stay healthy. |
Hunt2behunter submitted pertient, detailed information and replied to emails quickly. Professional and friendly. We recommend working with Hunt2behunter when possible. |
Thank you for pointing out the vulnerability on our website! Very responsive. Appreciate it! |