Parallels Plesk v11.5.x - URL Protection Filter Bypass Vulnerability
The video has been recorded during the pentest session of ismail kaleem in the official parallels plesk hosting panel application. The video demonstrates how to bypass the url filter protection for malicious requests to execute malicious urls. The vulnerability is already patched by the parallels dev team.
The advisory of the vulnerability is not publicly available because the team participated in a silent security program of the laboratory.
Advanced Persistent Threat Golden_hands - Digital Bank Robbery of the Year 2020
Facebook Security - 12.500$ Bug Bounty reward to Security Researcher
Bug Bounty Program Award Winners 2014 - Exclusive Interview by Microsoft & PayPal
Shopify | Buy Button | Persistent Embed POST Inject Vulnerability