Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
534,771 coordinated disclosures
336,791 fixed vulnerabilities
791 bug bounties with 1,562 websites
16,083 researchers, 1105 honor badges

ELProfesor Top Security Researcher of the Month | Security Researcher Profile


Security researcher ELProfesor has already helped fix 2738 vulnerabilities.



Researcher reputation:  1600

Real name:
Taha

About me:
Our Democracy has been Hacked ! F**K society

How to contact me:
this is my email adresse : [email protected]

Experience in Application Security
3-5 years

Award / Bug Bounty I prefer:
I prefer :
- Rewards
- Benefits Gifts
- Swag
- PayPal Money


Anything that you wish to award me will motivate me to continue doing what I'm doing

Recommendations and Acknowledgements

    19 May, 2020
     PaulMar23292621 [email protected] from A1 Telekom Austria:
Hey Taha!
Thank you very much for reporting the XSS issue to us. It should be resolved now. We don't have a hall of fame on your website yet, but I'll make sure you are on there once it arrives.
Thanks and all the best,
[email protected]
    18 May, 2020
     AnimeCons Patrick from FanCons:
Found an XSS issue we had open. Very helpful info!
    13 May, 2020
     rundumsbaby rundumsbaby from rundumsbaby:
Thank you very much for reporting the XSS vulnerability and your quick response.
    12 May, 2020
     Hansaplastique Hansaplastique from www.weethet.nl:
Taha found another well hidden vulnerability, with some good instructions on how to reproduce the issue. Highly recommended!
Thanks again Taha and keep up the good work!
    6 May, 2020
     seedfinder j.a. from seedfinder:
Thanks a lot for the info about that bugs! Shit happens - but luckily there are people like ELProfesor who are here to help us lazy developers to get our stuff fixed :) Thanks again man!
    5 May, 2020
     easyeieio Ian from UKCS:
Thank you for pointing out the XSS vulnerability, and your quick reply to let us know where it was.
    20 April, 2020
     MPDL Ben from MPDL:
Thank you very much for finding the bug on our website and your responsible disclosure. Absolutely appreciated. You make the web a better place!
    10 April, 2020
     Hansaplastique Hansaplastique from www.weethet.nl:
I can highly recommend working with Taha!
He's knowledgable, very responsive and provides clear information and examples, which helped me resolved the issues.
    8 April, 2020
     Hansaplastique Hans from www.weethet.nl:
I can highly recommend working with ELProfesor.
He's knowledgable, very responsive and provides clear information and examples, which helped me resolved the issues.
    26 March, 2020
     KyleGeorgeArch Kyle Arch from Learning Pool:
Thank you ElProfesor for responsibly disclosing an XSS issue and providing the reproduction steps. With your help we've identified the issue and are working on a fix. Thank you for your hard work and responsible practices.

Shows the first 10 recommendations. See all.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:10347
Total reports on VIP sites:2029
Total patched vulnerabilities:2738
Total vulnerabilities on Hold (Open Bug Bounty):1520
Recommendations received:105
Active since:16.10.2017
Top VIP Security Researcher Awards: Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week

Open Bug Bounty Certificate



27.11.2019  Reflected xss in 360totalsecurity

i have found vulnerability in 360totalsecurity ,is Reflected XSS in https://blog.360totalsecurity.com

Steps to reproduce :

Go to https://blog.360totalsecurity.com

and To : https://blog.360totalsecurity.com/en/safe-tips-for-wannacry-ransomware-attack/?utm_campaign=WannaCry_tips&utm_content=360.NSA.defense.tool&utm_medium=text_link&utm_source=Blog

and replace utm_source value by this XSS payload : x”><svG onLoad=prompt(document.domain)>

Line: <a href=”https://blog.360totalsecurity.com/en?utm_source=x"><svG onLoad=prompt(document.domain)>

Poc:

https://blog.360totalsecurity.com/en/safe-tips-for-wannacry-ransomware-attack/?utm_campaign=WannaCry_tips&utm_content=360.NSA.defense.tool&utm_medium=text_link&utm_source=x"><svG onLoad=prompt(document.domain)>

Regards,

TAHA

21.11.2019  blind xss in apple

This is my report about blind xss in apple via user agent


Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
02.12.2017
patched
Cross Site Scripting
02.12.2017
patched
Cross Site Scripting
02.12.2017
patched
Cross Site Scripting
02.12.2017
patched
Cross Site Scripting
02.12.2017
patched
Cross Site Scripting
02.12.2017
patched
Cross Site Scripting
02.12.2017
patched
Cross Site Scripting
02.12.2017
patched
Cross Site Scripting
02.12.2017
patched
Cross Site Scripting
01.12.2017
patched
Cross Site Scripting
01.12.2017
unpatched
Cross Site Scripting
01.12.2017
unpatched
Cross Site Scripting
01.12.2017
unpatched
Cross Site Scripting
01.12.2017
unpatched
Cross Site Scripting
01.12.2017
unpatched
Cross Site Scripting
01.12.2017
patched
Cross Site Scripting
30.11.2017
patched
Cross Site Scripting
30.11.2017
unpatched
Cross Site Scripting
30.11.2017
patched
Cross Site Scripting
30.11.2017
unpatched
Cross Site Scripting

  Latest Patched

 06.06.2020 diyar.ps
 06.06.2020 ebi.ac.uk
 06.06.2020 cnbctv18.com
 06.06.2020 trueplookpanya.com
 06.06.2020 cornell.edu
 05.06.2020 moneycontrol.com
 05.06.2020 whtop.com
 05.06.2020 micvideal.es
 05.06.2020 polito.it
 04.06.2020 psu.kz

  Latest Blog Posts

04.04.2020 by Rando02355205
(Alibaba) message.alibaba.com [IDOR] - [Bug Bounty]
12.03.2020 by Rando02355205
(Paypal) www.paypal.com [CSP High Level] - [XSS Reflected] - [Bug Bounty] - [Write Up]
08.03.2020 by CybeReports
JDECO.net XSS Vulnerability| CybeReports
29.02.2020 by Rando02355205
(Google) groups.google.com - [Stored XSS] - [Bug Bounty] - [WriteUp] - [24/02/2020]
10.02.2020 by 0xrocky
Stored XSS on h2biz.net

  Recent Recommendations

    4 June, 2020
     vovsoft:
Thank you for making the web a better place.
    4 June, 2020
     LKee6r:
Research privately disclosed XSS vulnerability. Thank you for the notification!
    3 June, 2020
     viewbug:
Thank you for helping us make our product safer. We appreciate how you reported the vulnerability and the detailed explanation with what could be done if left unattended. Really helpful :)
    2 June, 2020
     haneynj:
Rajesh noted we had some vulnerabilities on one of our sites. When we reached out, he was helpful and shared his report. Thank you for reporting.
    2 June, 2020
     haraldbro:
Thank you for helping us identify an XSS. The description of the vulnerability was clear and allowed us to make a fix quickly.