Mozilla CVE 2013 6674 WireTap – Filter Bypass & Persistent Software Vulnerability
In 2013 Q2-3 Ateeq ur Rehman Khan (vl core team) discovered a filter bypass issue with a persistent attack vector in the mozilla gecko engine of the seamonkey and thunderbird software. The vulnerability was tricky to exploit and not easy not discover with the full impact in one step. After 2 weeks analysis of the vulnerability ateeq figured out the location of the problem but also the different attack methods and vectors around the issue.
Advanced Persistent Threat Golden_hands - Digital Bank Robbery of the Year 2020
Facebook Security - 12.500$ Bug Bounty reward to Security Researcher
Bug Bounty Program Award Winners 2014 - Exclusive Interview by Microsoft & PayPal
Shopify | Buy Button | Persistent Embed POST Inject Vulnerability