Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
552,703 coordinated disclosures
355,077 fixed vulnerabilities
831 bug bounties with 1,611 websites
17,176 researchers, 1151 honor badges

ELProfesor Top Security Researcher of the Month | Security Researcher Profile


Security researcher ELProfesor has already helped fix 2827 vulnerabilities.



Researcher reputation:  1660

Real name:
Taha

About me:
Our Democracy has been Hacked ! F**K society

How to contact me:
this is my email adresse : [email protected]

Experience in Application Security
3-5 years

Award / Bug Bounty I prefer:
I prefer :
- Rewards
- Benefits Gifts
- Swag
- PayPal Money


Anything that you wish to award me will motivate me to continue doing what I'm doing

Recommendations and Acknowledgements

    3 July, 2020
     booksprice Doron from Booksprice:
I can highly recommend working with Taha!
He really helped us to understand the issue.
    17 June, 2020
     zaikoio Zaiko from Zaiko:
Taha, thank you for your report and the excellent work!
    19 May, 2020
     PaulMar23292621 [email protected] from A1 Telekom Austria:
Hey Taha!
Thank you very much for reporting the XSS issue to us. It should be resolved now. We don't have a hall of fame on your website yet, but I'll make sure you are on there once it arrives.
Thanks and all the best,
[email protected]
    18 May, 2020
     AnimeCons Patrick from FanCons:
Found an XSS issue we had open. Very helpful info!
    13 May, 2020
     rundumsbaby rundumsbaby from rundumsbaby:
Thank you very much for reporting the XSS vulnerability and your quick response.
    12 May, 2020
     Hansaplastique Hansaplastique from www.weethet.nl:
Taha found another well hidden vulnerability, with some good instructions on how to reproduce the issue. Highly recommended!
Thanks again Taha and keep up the good work!
    6 May, 2020
     seedfinder j.a. from seedfinder:
Thanks a lot for the info about that bugs! Shit happens - but luckily there are people like ELProfesor who are here to help us lazy developers to get our stuff fixed :) Thanks again man!
    5 May, 2020
     easyeieio Ian from UKCS:
Thank you for pointing out the XSS vulnerability, and your quick reply to let us know where it was.
    20 April, 2020
     MPDL Ben from MPDL:
Thank you very much for finding the bug on our website and your responsible disclosure. Absolutely appreciated. You make the web a better place!
    10 April, 2020
     Hansaplastique Hansaplastique from www.weethet.nl:
I can highly recommend working with Taha!
He's knowledgable, very responsive and provides clear information and examples, which helped me resolved the issues.

Shows the first 10 recommendations. See all.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:11203
Total reports on VIP sites:2137
Total patched vulnerabilities:2827
Total vulnerabilities on Hold (Open Bug Bounty):1156
Recommendations received:107
Active since:09.05.2018
Top VIP Security Researcher Awards: Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week

Open Bug Bounty Certificate



27.11.2019  Reflected xss in 360totalsecurity

i have found vulnerability in 360totalsecurity ,is Reflected XSS in https://blog.360totalsecurity.com

Steps to reproduce :

Go to https://blog.360totalsecurity.com

and To : https://blog.360totalsecurity.com/en/safe-tips-for-wannacry-ransomware-attack/?utm_campaign=WannaCry_tips&utm_content=360.NSA.defense.tool&utm_medium=text_link&utm_source=Blog

and replace utm_source value by this XSS payload : x”><svG onLoad=prompt(document.domain)>

Line: <a href=”https://blog.360totalsecurity.com/en?utm_source=x"><svG onLoad=prompt(document.domain)>

Poc:

https://blog.360totalsecurity.com/en/safe-tips-for-wannacry-ransomware-attack/?utm_campaign=WannaCry_tips&utm_content=360.NSA.defense.tool&utm_medium=text_link&utm_source=x"><svG onLoad=prompt(document.domain)>

Regards,

TAHA

21.11.2019  blind xss in apple

This is my report about blind xss in apple via user agent


Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
03.08.2020
On Hold
Cross Site Scripting
03.08.2020
On Hold
Cross Site Scripting
03.08.2020
On Hold
Cross Site Scripting
03.08.2020
On Hold
Cross Site Scripting
03.08.2020
On Hold
Cross Site Scripting
03.08.2020
On Hold
Cross Site Scripting
03.08.2020
On Hold
Cross Site Scripting
03.08.2020
On Hold
Cross Site Scripting
03.08.2020
On Hold
Cross Site Scripting
03.08.2020
On Hold
Cross Site Scripting
03.08.2020
On Hold
Cross Site Scripting
03.08.2020
On Hold
Cross Site Scripting
03.08.2020
On Hold
Cross Site Scripting
03.08.2020
On Hold
Cross Site Scripting
03.08.2020
On Hold
Cross Site Scripting
03.08.2020
On Hold
Cross Site Scripting
03.08.2020
On Hold
Cross Site Scripting
03.08.2020
On Hold
Cross Site Scripting
02.08.2020
On Hold
Cross Site Scripting
02.08.2020
On Hold
Cross Site Scripting

  Latest Patched

 03.08.2020 9yards.me
 03.08.2020 bankier.pl
 02.08.2020 imobiliare.ro
 02.08.2020 enviro.epa.gov
 02.08.2020 healthfinder.gov
 01.08.2020 istockphoto.com
 01.08.2020 nla.gov.au
 01.08.2020 ac-besancon.fr
 01.08.2020 stmods.ru
 01.08.2020 iomtoday.co.im

  Latest Blog Posts

24.06.2020 by Gkexamquiz
How to Find Contacts To Report Bugs &amp; Security Vulnerabilities | Bug Bounty Tutorials 2020
24.06.2020 by 0xcrypto
Improper Access Control - Generic: Unrestricted access to any "connected pack" on docs in coda.io
04.04.2020 by Rando02355205
(Alibaba) message.alibaba.com [IDOR] - [Bug Bounty]
12.03.2020 by Rando02355205
(Paypal) www.paypal.com [CSP High Level] - [XSS Reflected] - [Bug Bounty] - [Write Up]
08.03.2020 by CybeReports
JDECO.net XSS Vulnerability| CybeReports

  Recent Recommendations

    3 August, 2020
     Robert_CMI:
Thank you for reporting the vulnerability on our website, we very much appreciate your quick response and good description of the issue.
    1 August, 2020
     aboros:
Thank you for finding several issues on our site
    30 July, 2020
     HoutVasthouden:
Thank you Gaurav for helping us making our website a safer place! You reported a XSS vulnerability on one of our webforms, you gave us very clear information on the issue, so that we were able to fix the bug.
Keep up the good work!
    30 July, 2020
     h_ono:
Great work, thanks for finding a bug and kindly reporting it.
    30 July, 2020
     h_ono:
Great work, thanks for finding a bug and kindly reporting it.