Badges
See allBug Bounty Status Distribution
Vulnerability Types
Journey
Fri, Jun 21, 2024
Joined the community for the first time. Welcome to Com Olho!
05:22 PM
Com Olho
Fri, Jun 21, 2024
First Bug Bounty Report: Baazi Games Bug Bounty Program
06:21 PM
Baazi Games
Sat, Jun 22, 2024
First Rewarded Bug Bounty: Exam Prep Tool Security Research Reward
07:38 AM
Exam Prep Tool
This table provides an overview of the researcher's skills, tools, interests, learning goals, styles, and security focuses.
Category | Details |
---|---|
Tools Used |
|
Hacking Interest |
|
Learning Goals |
|
Learning Style |
|
Security Focus |
|
This table showcases the achievements of researchers, highlighting the date, program name, severity, vulnerability type, and status of each rewarded report.
Date | Program Name | Severity | Vulnerability Type | Status |
---|---|---|---|---|
July 20, 2024 | DS Group Certificate Research Program | P3 | security_misconfiguration | View Certificate |
July 19, 2024 | DS Group Certificate Research Program | P1 | cross_site_scripting | View Certificate |
July 19, 2024 | DS Group Certificate Research Program | P4 | security_misconfiguration | View Certificate |
July 19, 2024 | DS Group Certificate Research Program | P4 | other | View Certificate |
July 16, 2024 | Com Olho Security Research Reward Program | P4 | missing_access_control | Rewarded |
June 22, 2024 | Baazi Games Bug Bounty Program | P4 | insecure_direct_object_references | View Certificate |
June 22, 2024 | Baazi Games Bug Bounty Program | P3 | race_condition | Rewarded |
June 22, 2024 | Exam Prep Tool Security Research Reward | P4 | race_condition | Rewarded |
This graph shows the trend of bug bounty submissions by week. Each point on the graph represents the total number of submissions in a given week.
This graph illustrates the distribution of reported vulnerabilities by severity level. Each bar represents the count of reports for a particular severity, providing insight into the types of vulnerabilities being identified.
This graph shows the distribution of vulnerability types in successfully submitted CTFs.