Coordinated and Responsible Vulnerability Disclosure Free Bug Bounty Program 297,568 coordinated disclosures
175,899 fixed vulnerabilities
237,924 websites, 17,856 VIP websites
8,051 researchers, 6,915 subscribers

MLT Top Security Researcher Top VIP Security Researcher of the Month | Security Researcher Profile


Security researcher MLT has already helped fix 1959 vulnerabilities.



Researcher reputation:  20

Real name:
Matt Telfer

About me:
Back from hiatus. I will now be submitting vulnerabilities again.

How to contact me:
[email protected]

Experience in Application Security
over 5 years

Award / Bug Bounty I prefer:
$$$ (PayPal, Bitcoin, Bank Transfer)
Gift Cards (Amazon, etc)
T-Shirts, clothing
Food and Drinks :)

Recommendations and Acknowledgements

    9 March, 2016
     zothar David Sowder from UT Arlington:
MLT responded with the relevant details in a reasonable amount of time. Our thanks to MLT for providing this information.

Please login via Twitter to add a recommendation

Awards and Achievements


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Research Statistics



Total reports:2536
Total reports on VIP sites:364
Total patched vulnerabilities:1959
Total vulnerabilities on Hold (Open Bug Bounty):4
Recommendations received:1
Active since:28.02.2015
Top Security Researcher Awards: The Top Security Researcher Top Security Researcher of the Month Top Security Researcher of the Month
Top VIP Security Researcher Awards: Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week

Open Bug Bounty Certificate



Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
13.03.2016
patched
Open Redirect
13.03.2016
unpatched
Open Redirect
13.03.2016
patched
Cross Site Scripting
13.03.2016
patched
Cross Site Scripting
13.03.2016
patched
Cross Site Scripting
13.03.2016
patched
Cross Site Scripting
13.03.2016
patched
Cross Site Scripting
13.03.2016
patched
Cross Site Scripting
13.03.2016
patched
Cross Site Scripting
13.03.2016
patched
Cross Site Scripting
12.03.2016
patched
Cross Site Scripting
10.03.2016
unpatched
Cross Site Scripting
10.03.2016
patched
Open Redirect
10.03.2016
patched
Open Redirect
10.03.2016
unpatched
Open Redirect
09.03.2016
unpatched
Cross Site Scripting
09.03.2016
unpatched
Cross Site Scripting
09.03.2016
patched
Cross Site Scripting
09.03.2016
patched
Cross Site Scripting
09.03.2016
patched
Cross Site Scripting

  Latest Patched

      newsprofin.com
    Patched on 14.12.2018
      scalemates.com
    Patched on 14.12.2018
      tvtv.de
    Patched on 14.12.2018
      hdlava.me
    Patched on 14.12.2018
      toywiz.com
    Patched on 13.12.2018
      tsum.ru
    Patched on 13.12.2018
      weblio.jp
    Patched on 13.12.2018
      otago.ac.nz
    Patched on 13.12.2018
      tsheets.com
    Patched on 12.12.2018
      ukrinform.ru
    Patched on 12.12.2018

  Recent Recommendations

    14 December, 2018
     Smartprix:
Thank you Mohamed for reporting the XSS vulnerability on our site. Great Job. Its been fixed now.
    13 December, 2018
     maennerformat:
Thank you very much for your friendly and uncomplicated help! :-)
    13 December, 2018
     wirthundhorn:
Thank you for your support on finding vulnerabilities on our site. Thus we could improve the security.
    12 December, 2018
     ISOatUO:
Very quick turnaround; Andrei provided accurate details immediately on contact, and also noticed when we'd put the fix in before being notified.
    12 December, 2018
     teachercorner:
Thank you kOt for notifying us of this bug, and tips on how to fix it. We appreciate your research!