Ritesh GohilSoftr Version 2.0We can inject malicious payload in the first name field and whenever we will do create a New Victim account then the payload will reflect…Jul 18, 2022Jul 18, 2022
Ritesh GohilATO of WordPress Website “4 digits €€€€ Bounty in 5 Minute!”Hi Everyone,Aug 28, 20211Aug 28, 20211
Ritesh GohilEmployee Performance Evaluation System 1.0# Exploit Title: Employee Performance Evaluation System 1.0 — ‘ Task and Description’ Persistent Cross Site Scripting # Exploit Author…Jan 20, 2021Jan 20, 2021
Ritesh GohilTextpattern 4.8.4 is affected by cross-site scripting (XSS) in the Body parameter.# Exploit Title: Textpattern CMS v4.8.4 “Content>Write>Body” — Stored Cross-Site Scripting # Exploit Author: Ritesh Gohil # Vendor…Jan 20, 2021Jan 20, 2021
Ritesh GohilEmployee Performance Evaluation System 1.0 — ‘ First and Last Name’ Persistent Cross Site Scripting# Exploit Title: Employee Performance Evaluation System 1.0 — ‘ First and Last Name’ Persistent Cross Site Scripting # Date: 05/12/2020…Dec 5, 2020Dec 5, 2020
Ritesh GohilinInfoSec Write-ups🎯Business Logic Flaw in Google Acquisition! (Hall Of Fame)🎯Always Try Harder! Because It’s Google!Sep 21, 2020Sep 21, 2020