SECURING THE DIGITAL INFRASTRUCTURE. SPECIALIZING IN OFFENSIVE SECURITY, VULNERABILITY ASSESSMENT, AND RED TEAM OPERATIONS.
SECURITY BUGS REPORTED
COMPANIES ACKNOWLEDGED
CVEs PUBLISHED
eLearnSecurity Web Application Penetration Tester eXtreme
ADVANCEDInternational English Language Testing System
COMMUNICATIONThe wp-publications plugin (<=v1.2) fails to escape filenames before rendering, allowing Stored XSS even for admins without unfiltered_html.
The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
"Very helpful information, and well detailed. The average response time was very fast."
"Thank you for submitting a report. Your efforts are greatly appreciated. We confirm that the reported vulnerability is valid and have started on the necessary steps to fix it."
"Thank you for your submission. Enjoy your reward and keep up the good work. Happy hunting! Thanks for your well-written report and POC."
"We thank @zeynalxanquliyev for their great report and thus helping to keep the MODs systems secure. We look forward to working with you in the future. Happy hunting!"
"We appreciate the security mindset you've shown in identifying this. We value your contributions and look forward to your future submissions."
>> DIRECT_COMMUNICATION_PROTOCOL: LINKEDIN_CHANNEL
ESTABLISH_LINK