Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
555,004 coordinated disclosures
356,332 fixed vulnerabilities
841 bug bounties with 1,623 websites
17,327 researchers, 1153 honor badges

ELProfesor Top Security Researcher of the Month | Security Researcher Profile


Security researcher ELProfesor has already helped fix 2837 vulnerabilities.



Researcher reputation:  1660

Real name:
Taha

About me:
Our Democracy has been Hacked ! F**K society

How to contact me:
this is my email adresse : [email protected]

Experience in Application Security
3-5 years

Award / Bug Bounty I prefer:
I prefer :
- Rewards
- Benefits Gifts
- Swag
- PayPal Money


Anything that you wish to award me will motivate me to continue doing what I'm doing

Recommendations and Acknowledgements

    3 July, 2020
     booksprice Doron from Booksprice:
I can highly recommend working with Taha!
He really helped us to understand the issue.
    17 June, 2020
     zaikoio Zaiko from Zaiko:
Taha, thank you for your report and the excellent work!
    19 May, 2020
     PaulMar23292621 [email protected] from A1 Telekom Austria:
Hey Taha!
Thank you very much for reporting the XSS issue to us. It should be resolved now. We don't have a hall of fame on your website yet, but I'll make sure you are on there once it arrives.
Thanks and all the best,
[email protected]
    18 May, 2020
     AnimeCons Patrick from FanCons:
Found an XSS issue we had open. Very helpful info!
    13 May, 2020
     rundumsbaby rundumsbaby from rundumsbaby:
Thank you very much for reporting the XSS vulnerability and your quick response.
    12 May, 2020
     Hansaplastique Hansaplastique from www.weethet.nl:
Taha found another well hidden vulnerability, with some good instructions on how to reproduce the issue. Highly recommended!
Thanks again Taha and keep up the good work!
    6 May, 2020
     seedfinder j.a. from seedfinder:
Thanks a lot for the info about that bugs! Shit happens - but luckily there are people like ELProfesor who are here to help us lazy developers to get our stuff fixed :) Thanks again man!
    5 May, 2020
     easyeieio Ian from UKCS:
Thank you for pointing out the XSS vulnerability, and your quick reply to let us know where it was.
    20 April, 2020
     MPDL Ben from MPDL:
Thank you very much for finding the bug on our website and your responsible disclosure. Absolutely appreciated. You make the web a better place!
    10 April, 2020
     Hansaplastique Hansaplastique from www.weethet.nl:
I can highly recommend working with Taha!
He's knowledgable, very responsive and provides clear information and examples, which helped me resolved the issues.

Shows the first 10 recommendations. See all.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:11263
Total reports on VIP sites:2139
Total patched vulnerabilities:2837
Total vulnerabilities on Hold (Open Bug Bounty):1126
Recommendations received:107
Active since:09.05.2018
Top VIP Security Researcher Awards: Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week

Open Bug Bounty Certificate



27.11.2019  Reflected xss in 360totalsecurity

i have found vulnerability in 360totalsecurity ,is Reflected XSS in https://blog.360totalsecurity.com

Steps to reproduce :

Go to https://blog.360totalsecurity.com

and To : https://blog.360totalsecurity.com/en/safe-tips-for-wannacry-ransomware-attack/?utm_campaign=WannaCry_tips&utm_content=360.NSA.defense.tool&utm_medium=text_link&utm_source=Blog

and replace utm_source value by this XSS payload : x”><svG onLoad=prompt(document.domain)>

Line: <a href=”https://blog.360totalsecurity.com/en?utm_source=x"><svG onLoad=prompt(document.domain)>

Poc:

https://blog.360totalsecurity.com/en/safe-tips-for-wannacry-ransomware-attack/?utm_campaign=WannaCry_tips&utm_content=360.NSA.defense.tool&utm_medium=text_link&utm_source=x"><svG onLoad=prompt(document.domain)>

Regards,

TAHA

21.11.2019  blind xss in apple

This is my report about blind xss in apple via user agent


Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
04.05.2020
unpatched
Cross Site Scripting
04.05.2020
unpatched
Cross Site Scripting
04.05.2020
unpatched
Cross Site Scripting
04.05.2020
unpatched
Cross Site Scripting
04.05.2020
unpatched
Cross Site Scripting
04.05.2020
unpatched
Cross Site Scripting
04.05.2020
unpatched
Cross Site Scripting
04.05.2020
unpatched
Cross Site Scripting
04.05.2020
unpatched
Cross Site Scripting
04.05.2020
unpatched
Cross Site Scripting
04.05.2020
unpatched
Cross Site Scripting
04.05.2020
unpatched
Cross Site Scripting
04.05.2020
unpatched
Cross Site Scripting
04.05.2020
unpatched
Cross Site Scripting
03.05.2020
patched
Cross Site Scripting
03.05.2020
patched
Cross Site Scripting
03.05.2020
unpatched
Cross Site Scripting
03.05.2020
unpatched
Cross Site Scripting
03.05.2020
unpatched
Cross Site Scripting
03.05.2020
unpatched
Cross Site Scripting

  Latest Patched

 10.08.2020 da.ai
 10.08.2020 find-job.net
 10.08.2020 radiotimes.com
 10.08.2020 maserati.com
 10.08.2020 erebounicollege.am
 10.08.2020 gq-magazine.co.uk
 10.08.2020 nintendo.com
 10.08.2020 gucci.com
 10.08.2020 blesk.cz
 10.08.2020 bazos.cz

  Latest Blog Posts

24.06.2020 by Gkexamquiz
How to Find Contacts To Report Bugs &amp; Security Vulnerabilities | Bug Bounty Tutorials 2020
24.06.2020 by 0xcrypto
Improper Access Control - Generic: Unrestricted access to any "connected pack" on docs in coda.io
04.04.2020 by Rando02355205
(Alibaba) message.alibaba.com [IDOR] - [Bug Bounty]
12.03.2020 by Rando02355205
(Paypal) www.paypal.com [CSP High Level] - [XSS Reflected] - [Bug Bounty] - [Write Up]
08.03.2020 by CybeReports
JDECO.net XSS Vulnerability| CybeReports

  Recent Recommendations

    10 August, 2020
     msawired:
Thank you for reporting the XSS vulnerability. Your explanations were very helpful, and we were able to resolve the issue in no time.
    6 August, 2020
     Robert_CMI:
Thank you Rajesh for reporting vulnerabilities on our website, your quick and detailed response was very valuable to us!
    6 August, 2020
     StefanCink:
Thanks to @singhnitesh21 we were able to close a vulnerability on our website asap. Thank you!
    5 August, 2020
     kkb5mobile:
Thank you for pointing out the vulnerability.
Thanks to you, I was able to respond safely.
    5 August, 2020
     kkb5mobile:
Thank you for pointing out the vulnerability.
Thanks to you, I was able to respond safely.