Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
533,655 coordinated disclosures
288,425 fixed vulnerabilities
739 bug bounties with 1,454 websites
14,999 researchers, 1071 honor badges

ELProfesor Top Security Researcher of the Month | Security Researcher Profile


Security researcher ELProfesor has already helped fix 2498 vulnerabilities.



Researcher reputation:  1430

Real name:
TAHA SMILY

About me:
Our Democracy has been Hacked ! F**K society

How to contact me:
this is my email adresse : [email protected]

Alternative Contacts:
https://www.linkedin.com/in/taha-smily-195aa3145/

Experience in Application Security
3-5 years

Award / Bug Bounty I prefer:
I prefer :
- Rewards
- Benefits Gifts
- Swag
- Hall of Fame
- Acknowledgment
- PayPal Money


Anything that you wish to award me will motivate me to continue doing what I'm doing

Follow me on:
Twitter
LinkedIn

Recommendations and Acknowledgements

    26 March, 2020
     KyleGeorgeArch Kyle Arch from Learning Pool:
Thank you ElProfesor for responsibly disclosing an XSS issue and providing the reproduction steps. With your help we've identified the issue and are working on a fix. Thank you for your hard work and responsible practices.
    10 March, 2020
     GColsoul Guy from Ineo:
Thank you for your vigilance. It helps us to improve continuously our systems. Very helpful.
    10 March, 2020
     RuncornLinnets Steve Pritchard from Runcorn Linnets FC:
Taha found a particularly tricky XSS problem on our site, and responsibly reported it to us so we could correct the issue. We thank him for his responsible disclosure and hard work bringing security flaws like this to our attention.
    9 March, 2020
     IT_Wolve Markus from Pepperl+Fuchs AG:
Thank you Taha for reporting and helping us finding these XSS issues on our website. We fixed it.
    16 February, 2020
     bigwavedave_ca DaveB from bwd:
Thank you Taha for finding and reporting the vulnerability on my website.
    3 February, 2020
     searacom Pedro Marques from Seara:
ElProfesor, thanks for reporting the XSS vuln, the quick reply and clear message that led us to the right correction. Great job!
    3 February, 2020
     vavideode Vavideo from Vavideo:
Thank you very much for making suggestions about security vulnerabilities!
    30 January, 2020
     SecuriteInfoCom Arnaud Jacques from Securiteinfo.com:
Thank you for your report. It is now fixed.
    29 January, 2020
     Travelmath John from Travelmath:
Great job finding a vulnerability that others missed. I have fixed the issue now, thanks for your help.
    28 January, 2020
     daZwiafl dazwiafl from Meramo Verlag GmbH:
Very responsive and provided clear information about what they had found.

Shows the first 10 recommendations. See all.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:9208
Total reports on VIP sites:1835
Total patched vulnerabilities:2498
Total vulnerabilities on Hold (Open Bug Bounty):1296
Recommendations received:96
Active since:12.10.2017
Top VIP Security Researcher Awards: Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week

Open Bug Bounty Certificate



27.11.2019  Reflected xss in 360totalsecurity

i have found vulnerability in 360totalsecurity ,is Reflected XSS in https://blog.360totalsecurity.com

Steps to reproduce :

Go to https://blog.360totalsecurity.com

and To : https://blog.360totalsecurity.com/en/safe-tips-for-wannacry-ransomware-attack/?utm_campaign=WannaCry_tips&utm_content=360.NSA.defense.tool&utm_medium=text_link&utm_source=Blog

and replace utm_source value by this XSS payload : x”><svG onLoad=prompt(document.domain)>

Line: <a href=”https://blog.360totalsecurity.com/en?utm_source=x"><svG onLoad=prompt(document.domain)>

Poc:

https://blog.360totalsecurity.com/en/safe-tips-for-wannacry-ransomware-attack/?utm_campaign=WannaCry_tips&utm_content=360.NSA.defense.tool&utm_medium=text_link&utm_source=x"><svG onLoad=prompt(document.domain)>

Regards,

TAHA

21.11.2019  blind xss in apple

This is my report about blind xss in apple via user agent


Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
31.10.2017
unpatched
Cross Site Scripting
31.10.2017
patched
Cross Site Scripting
31.10.2017
patched
Cross Site Scripting
31.10.2017
patched
Cross Site Scripting
31.10.2017
unpatched
Cross Site Scripting
31.10.2017
patched
Cross Site Scripting
31.10.2017
patched
Cross Site Scripting
31.10.2017
patched
Cross Site Scripting
31.10.2017
patched
Cross Site Scripting
31.10.2017
patched
Cross Site Scripting
31.10.2017
unpatched
Cross Site Scripting
31.10.2017
patched
Cross Site Scripting
31.10.2017
unpatched
Cross Site Scripting
31.10.2017
unpatched
Cross Site Scripting
31.10.2017
patched
Cross Site Scripting
31.10.2017
patched
Cross Site Scripting
31.10.2017
unpatched
Cross Site Scripting
31.10.2017
unpatched
Cross Site Scripting
30.10.2017
unpatched
Cross Site Scripting
30.10.2017
patched
Cross Site Scripting

  Latest Patched

 06.04.2020 cdiscount.com
 06.04.2020 psu.edu
 06.04.2020 pornozak.name
 06.04.2020 www12.kissasian.ai
 06.04.2020 onlinejobs.ph
 05.04.2020 burdastyle.ru
 05.04.2020 jalopnik.com
 05.04.2020 stickpng.com
 05.04.2020 extrabux.com

  Latest Blog Posts

04.04.2020 by Rando02355205
(Alibaba) message.alibaba.com [IDOR] - [Bug Bounty]
12.03.2020 by Rando02355205
(Paypal) www.paypal.com [CSP High Level] - [XSS Reflected] - [Bug Bounty] - [Write Up]
08.03.2020 by CybeReports
JDECO.net XSS Vulnerability| CybeReports
29.02.2020 by Rando02355205
(Google) groups.google.com - [Stored XSS] - [Bug Bounty] - [WriteUp] - [24/02/2020]
10.02.2020 by 0xrocky
Stored XSS on h2biz.net

  Recent Recommendations

    5 April, 2020
     christophmoar:
Cool and professional contact, quick response, I appreciate your effort.
Thanks!
    3 April, 2020
     KenDennis:
Brian helped to identify an XSS Vuln on a client's wordpress implementation and was quick and helpful to respond to our query. With his notes, we were able to quickly mitigate this issue and we appreciate his help and professionalism.
    2 April, 2020
     EmanuelePisapia:
I have really appreciated this researcher for his great skill and communication. He found a cross site scripting vulnerability on our service and help us fixing it. I recommend Broly157. He's a A++ researcher
    31 March, 2020
     reinisroz:
Thanks much, anguhari, for providing detailed information about XSS bug, found on our website. Highly recommended and professional security researcher!
    31 March, 2020
     admonaut:
Many thanks for your support and assistance. Good job :-)