Badges
See allBug Bounty Status Distribution
Vulnerability Types
This graph shows the status of coordinated submissions (Accepted/Rejected).
Coordinated Submissions
Journey
Tue, Jan 02, 2024
Joined the community for the first time. Welcome to Com Olho!
02:21 PM
Com Olho
Thu, May 30, 2024
First Bug Bounty Report: Baazi Games Bug Bounty Program
09:50 PM
Baazi Games
Thu, May 30, 2024
First Rewarded Bug Bounty: Baazi Games Bug Bounty Program
09:50 PM
Baazi Games
Sat, Jun 08, 2024
First Coordinated Program Submission
03:35 AM
codingblocks.com
This table provides an overview of the researcher's skills, tools, interests, learning goals, styles, and security focuses.
Category | Details |
---|---|
Tools Used |
|
Hacking Interest |
|
Learning Goals |
|
Learning Style |
|
Security Focus |
|
This table showcases the achievements of researchers, highlighting the date, program name, severity, vulnerability type, and status of each rewarded report.
Date | Program Name | Severity | Vulnerability Type | Status |
---|---|---|---|---|
October 03, 2024 | Max Healthcare Responsible Disclosure Program | P5 | other | View Certificate |
October 01, 2024 | Baazi Games Bug Bounty Program | P5 | memory_corruption | Vulnerability Closed |
June 28, 2024 | Com Olho Security Research Reward Program | P4 | memory_corruption | Rewarded |
June 28, 2024 | Exam Prep Tool Security Research Reward | P5 | security_misconfiguration | View Certificate |
June 23, 2024 | ELAN Limited Bug Bounty Program | P5 | security_misconfiguration | View Certificate |
June 20, 2024 | Baazi Games Bug Bounty Program | P5 | security_misconfiguration | View Certificate |
May 30, 2024 | Baazi Games Bug Bounty Program | P3 | hardcoded_credentials | Rewarded |
This graph shows the trend of bug bounty submissions by week. Each point on the graph represents the total number of submissions in a given week.
This graph illustrates the distribution of reported vulnerabilities by severity level. Each bar represents the count of reports for a particular severity, providing insight into the types of vulnerabilities being identified.