0x62626262.wordpress.com
CM-AD-Changer XSS Vulnerability | Rahul Pratap Singh
https://0x62626262.wordpress.com/2016/04/21/cm-ad-changer-xss-vulnerability
Information Security Enthusiast Exploit Development. April 21, 2016. April 21, 2016. Exploit Author : Rahul Pratap Singh. Version :1.7.2. Home page Link : https:/ wordpress.org/plugins/cm-ad-changer/. Website : 0x62626262.wordpress.com. Linkedin : https:/ in.linkedin.com/in/rahulpratapsingh94. 8212;————————————-. 8212;————————————-. Following parameters are not sanitized that leads to XSS Vulnerability. Title, comment, link. File Name: testfiles/cm-ad-changer/backend/views/admin settings.php. Unlimited P...
technet.microsoft.com
Security Researcher Acknowledgments - Microsoft Online Services | TechNet
https://technet.microsoft.com/en-us/security/cc308589
Skip to main content. Microsoft Tech Companion App. Server and Tools Blogs. Windows Server 2012 R2. System Center 2012 R2. Microsoft SQL Server 2014 SP1. Windows 8.1 Enterprise. Expert-led, virtual classes. Free Windows Server 2012 courses. Free Windows 8 courses. Microsoft Official Courses On-Demand. Windows Server Certification (MCSE). Private Cloud Certification (MCSE). SQL Server Certification (MCSE). Second shot for certification. Born To Learn blog. Find technical communities in your area. Traditio...
technet.microsoft.com
Security Researcher Acknowledgments - Microsoft Online Services | TechNet
https://technet.microsoft.com/en-us/security/cc308589.aspx
Skip to main content. Microsoft Tech Companion App. Server and Tools Blogs. Windows Server 2012 R2. System Center 2012 R2. Microsoft SQL Server 2014 SP1. Windows 8.1 Enterprise. Expert-led, virtual classes. Free Windows Server 2012 courses. Free Windows 8 courses. Microsoft Official Courses On-Demand. Windows Server Certification (MCSE). Private Cloud Certification (MCSE). SQL Server Certification (MCSE). Second shot for certification. Born To Learn blog. Find technical communities in your area. Traditio...
blog.czarsecurities.com
“9-5 job is Too Old School for a Hacker”: Meet Shritam Bhowmick! – Czar Securities
https://blog.czarsecurities.com/1077/9-5-job-is-too-old-school-for-a-hacker-meet-shritam-bhowmick
8220;9-5 job is Too Old School for a Hacker”: Meet Shritam Bhowmick! November 16, 2014. Working as a Self-employed Security Researcher is Amazing, Thrilling, Challenging, Impacting, and Self Disciplinary focus coordinated multi-tasking problem tackling monster is what Shritam Bhowmick thinks a 9-5 job never will! What was that one moment when you thought that yes, cyber security, this is my field! How did you pursue that? End of all, I belong to a part of the Cyber Security arena, my quest and understand...
0x62626262.wordpress.com
RSS Post Importer XSS Vulnerability | Rahul Pratap Singh
https://0x62626262.wordpress.com/2016/01/30/rss-post-importer-xss-vulnerability
Information Security Enthusiast Exploit Development. RSS Post Importer XSS Vulnerability. January 30, 2016. Product : RSS Post Importer. Exploit Author : Rahul Pratap Singh. Version : 2.2.1. Home page Link : https:/ wordpress.org/plugins/rss-post-importer/. Website : 0x62626262.wordpress.com. Linkedin : https:/ in.linkedin.com/in/rahulpratapsingh94. 8212;————————————-. 8212;————————————-. 8220;full text RSS feed api key” parameter is not sanitized that leads to Reflected XSS. 1) Go to the following url.
0x62626262.wordpress.com
Unlimited Pop-Ups WordPress Plugin XSS Vulnerability | Rahul Pratap Singh
https://0x62626262.wordpress.com/2016/04/21/unlimited-pop-ups-wordpress-plugin-xss-vulnerability
Information Security Enthusiast Exploit Development. Unlimited Pop-Ups WordPress Plugin XSS Vulnerability. April 21, 2016. Product : Unlimited Pop-Ups WordPress Plugin. Exploit Author : Rahul Pratap Singh. Version : 1.4.3. Home page Link : http:/ codecanyon.net/item/unlimited-popups-wordpress-plugin/8575498. Website : 0x62626262.wordpress.com. Linkedin : https:/ in.linkedin.com/in/rahulpratapsingh94. 8212;————————————-. Echo ‘ form action=”‘.admin url(‘admin.php? Php echo $ GET[‘id’];? Echo ‘ form ...
secure.sony.net
Secure@Sony
https://secure.sony.net/hallofthanks
Sony would like to express our most sincere thanks to the following individuals for their contribution to the security of our networks and products:. Oladigbolu, Shuaib Abidemi. Djaballah Mohamed Taher★. Ahmed Abd El Moati. Caner Köroğlu. José Manuel Aparicio González★. Chirag D. Paghadal. Teemu Kääriäinen. Ankit Bharathan (provensec labs). Mohammed Fayez Ahmed Albanna. Cyber Warrior Bug Researchers. Waleed Ezz Eldin (WIBF). Prateek Gokhale (Davv iips. Indore). Ahmed Abd El Moati Ahmed.
pwntoken.github.io
Portfolio - Pwntoken - Digital Security Research
http://pwntoken.github.io/portfolio
Pwntoken - Digital Security Research. Information Security Sciences with Shritam Bhowmick. To the mind that is still, the whole world surrenders. 2011 - 2012 (1 Year). Web Application Penetration Tester. Web Application Security Trainer. Defencely Cloud Security Pvt. Ltd. Web Application Security Specialist. Technical Specialist and SPOC @Application Security. Defence Contractor @Information Security, Director - Technical. My Professional sample work items could be accessed here. Etc, more chilled dishes .
0x62626262.wordpress.com
CSV Import XSS Vulnerability | Rahul Pratap Singh
https://0x62626262.wordpress.com/2016/02/23/csv-import-xss-vulnerability
Information Security Enthusiast Exploit Development. CSV Import XSS Vulnerability. February 23, 2016. February 23, 2016. Product : CSV Import. Exploit Author : Rahul Pratap Singh. Version : 1.0. Home page Link : https:/ wordpress.org/plugins/csv-import/. Website : 0x62626262.wordpress.com. Linkedin : https:/ in.linkedin.com/in/rahulpratapsingh94. 8212;————————————-. 8212;————————————-. 8220;alertmsg” parameter is not sanitized that leads to Reflected XSS. File Name: csv-import/index.php. Update to 1.1.
SOCIAL ENGAGEMENT