Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
542,018 coordinated disclosures
348,655 fixed vulnerabilities
818 bug bounties with 1,596 websites
16,738 researchers, 1134 honor badges

ELProfesor Top Security Researcher of the Month | Security Researcher Profile


Security researcher ELProfesor has already helped fix 2798 vulnerabilities.



Researcher reputation:  1650

Real name:
Taha

About me:
Our Democracy has been Hacked ! F**K society

How to contact me:
this is my email adresse : [email protected]

Experience in Application Security
3-5 years

Award / Bug Bounty I prefer:
I prefer :
- Rewards
- Benefits Gifts
- Swag
- PayPal Money


Anything that you wish to award me will motivate me to continue doing what I'm doing

Recommendations and Acknowledgements

    3 July, 2020
     booksprice Doron from Booksprice:
I can highly recommend working with Taha!
He really helped us to understand the issue.
    17 June, 2020
     zaikoio Zaiko from Zaiko:
Taha, thank you for your report and the excellent work!
    19 May, 2020
     PaulMar23292621 [email protected] from A1 Telekom Austria:
Hey Taha!
Thank you very much for reporting the XSS issue to us. It should be resolved now. We don't have a hall of fame on your website yet, but I'll make sure you are on there once it arrives.
Thanks and all the best,
[email protected]
    18 May, 2020
     AnimeCons Patrick from FanCons:
Found an XSS issue we had open. Very helpful info!
    13 May, 2020
     rundumsbaby rundumsbaby from rundumsbaby:
Thank you very much for reporting the XSS vulnerability and your quick response.
    12 May, 2020
     Hansaplastique Hansaplastique from www.weethet.nl:
Taha found another well hidden vulnerability, with some good instructions on how to reproduce the issue. Highly recommended!
Thanks again Taha and keep up the good work!
    6 May, 2020
     seedfinder j.a. from seedfinder:
Thanks a lot for the info about that bugs! Shit happens - but luckily there are people like ELProfesor who are here to help us lazy developers to get our stuff fixed :) Thanks again man!
    5 May, 2020
     easyeieio Ian from UKCS:
Thank you for pointing out the XSS vulnerability, and your quick reply to let us know where it was.
    20 April, 2020
     MPDL Ben from MPDL:
Thank you very much for finding the bug on our website and your responsible disclosure. Absolutely appreciated. You make the web a better place!
    10 April, 2020
     Hansaplastique Hansaplastique from www.weethet.nl:
I can highly recommend working with Taha!
He's knowledgable, very responsive and provides clear information and examples, which helped me resolved the issues.

Shows the first 10 recommendations. See all.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:10840
Total reports on VIP sites:2097
Total patched vulnerabilities:2798
Total vulnerabilities on Hold (Open Bug Bounty):1306
Recommendations received:107
Active since:09.05.2018
Top VIP Security Researcher Awards: Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week

Open Bug Bounty Certificate



27.11.2019  Reflected xss in 360totalsecurity

i have found vulnerability in 360totalsecurity ,is Reflected XSS in https://blog.360totalsecurity.com

Steps to reproduce :

Go to https://blog.360totalsecurity.com

and To : https://blog.360totalsecurity.com/en/safe-tips-for-wannacry-ransomware-attack/?utm_campaign=WannaCry_tips&utm_content=360.NSA.defense.tool&utm_medium=text_link&utm_source=Blog

and replace utm_source value by this XSS payload : x”><svG onLoad=prompt(document.domain)>

Line: <a href=”https://blog.360totalsecurity.com/en?utm_source=x"><svG onLoad=prompt(document.domain)>

Poc:

https://blog.360totalsecurity.com/en/safe-tips-for-wannacry-ransomware-attack/?utm_campaign=WannaCry_tips&utm_content=360.NSA.defense.tool&utm_medium=text_link&utm_source=x"><svG onLoad=prompt(document.domain)>

Regards,

TAHA

21.11.2019  blind xss in apple

This is my report about blind xss in apple via user agent


Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
28.06.2020
On Hold
Cross Site Scripting
28.06.2020
On Hold
Cross Site Scripting
28.06.2020
On Hold
Cross Site Scripting
28.06.2020
On Hold
Cross Site Scripting
28.06.2020
On Hold
Cross Site Scripting
28.06.2020
On Hold
Cross Site Scripting
28.06.2020
On Hold
Cross Site Scripting
28.06.2020
On Hold
Cross Site Scripting
28.06.2020
On Hold
Cross Site Scripting
27.06.2020
On Hold
Cross Site Scripting
27.06.2020
On Hold
Cross Site Scripting
27.06.2020
On Hold
Cross Site Scripting
27.06.2020
On Hold
Cross Site Scripting
27.06.2020
On Hold
Cross Site Scripting
27.06.2020
On Hold
Cross Site Scripting
27.06.2020
On Hold
Cross Site Scripting
27.06.2020
On Hold
Cross Site Scripting
26.06.2020
On Hold
Cross Site Scripting
26.06.2020
On Hold
Cross Site Scripting
26.06.2020
On Hold
Cross Site Scripting

  Latest Patched

 10.07.2020 dotdigital.com
 10.07.2020 pearltrees.com
 10.07.2020 milligazete.com.tr
 10.07.2020 reuters.com
 10.07.2020 groupon.com
 10.07.2020 edeka.de
 10.07.2020 as-1.co.jp
 10.07.2020 scad.edu
 10.07.2020 nodis3.gsfc.nasa.gov
 09.07.2020 plagscan.com

  Latest Blog Posts

24.06.2020 by Gkexamquiz
How to Find Contacts To Report Bugs &amp; Security Vulnerabilities | Bug Bounty Tutorials 2020
24.06.2020 by 0xcrypto
Improper Access Control - Generic: Unrestricted access to any "connected pack" on docs in coda.io
04.04.2020 by Rando02355205
(Alibaba) message.alibaba.com [IDOR] - [Bug Bounty]
12.03.2020 by Rando02355205
(Paypal) www.paypal.com [CSP High Level] - [XSS Reflected] - [Bug Bounty] - [Write Up]
08.03.2020 by CybeReports
JDECO.net XSS Vulnerability| CybeReports

  Recent Recommendations

    10 July, 2020
     Cajun_Lyrics:
Thank you very much for letting me know about the vulnerabilities on my website, It is really appreciated!
    10 July, 2020
     SNTech2:
A big thanks for notifying us of the bug! Much appreciated.
    9 July, 2020
     newstroll_de:
Thanks for reporting the bug in a very professional manner. We appreciate your work that helps us making our service more secure.
    9 July, 2020
     MariStep2:
Great job! :) Thank you for searching for vulnerabilities on our site. Very responsive, attentive and responsible Security Researcher.
    8 July, 2020
     ziduniwien:
Dear Tanzil,

The University of Vienna would like to thank you for your valuable contribution in finding multiple website security issues.
Your input is highly welcome and helps to raise the security level of our educational institution.

Servus and greetings from Vienna, Austria.