While Hakin9 does not appear to offer security consulting services, any company that sells security in any fashion, including a magazine dedicated to hacking and security, should try to maintain a secure online presence. While vulnerabilities happen to everyone in time, it is more important how you react to them. Quickly patching a vulnerability to minimize the window of exploitability is the right thing to do, for both customers and your reputation. In this case, Hakin9 has been found to be vulnerable to several common cross-site scripting (XSS) issues. These have not been tested by attrition.org, but have been submitted by several people who have a history of finding XSS vulnerabilities in web sites.
Another report came in that http://hakin9.org/wp-login.php has several XSS vulnerabilities (ym_field-16, ym_field-5, and ym_subscription parameters). This also suggests they are running WordPress, a notoriously insecure software package. Hakin9 has been notified of at several of these, as of October 5, 2012.
From: d3v1l [redacted] Date: 2012/10/5 Subject: Re: xss bug on your website To: Pawel Plocki (email@example.com) http://hakin9.org/index.php?s=%3Cscript%3Ealert%28%2Fxss%2F%29%3C%2Fscript%3E
: 2012/10/5 Pawel Plocki (firstname.lastname@example.org) Hi, Yes - we are working on it. Thank you for your engagement with helping us develope our service. Greetings, Pawel