Badges
See allBug Bounty Status Distribution
Vulnerability Types
Journey
Thu, May 09, 2024
Joined the community for the first time. Welcome to Com Olho!
02:58 PM
Com Olho
Thu, May 09, 2024
First Bug Bounty Report: ELAN Limited Bug Bounty Program
03:04 PM
ELAN LIMITED
Thu, May 09, 2024
First Rewarded Bug Bounty: Baazi Games Bug Bounty Program
04:05 PM
Baazi Games
This table provides an overview of the researcher's skills, tools, interests, learning goals, styles, and security focuses.
Category | Details |
---|---|
Tools Used |
|
Hacking Interest |
|
Learning Goals |
|
Learning Style |
|
Security Focus |
|
This table showcases the achievements of researchers, highlighting the date, program name, severity, vulnerability type, and status of each rewarded report.
Date | Program Name | Severity | Vulnerability Type | Status |
---|---|---|---|---|
May 30, 2024 | DS Group Certificate Research Program | P5 | other | View Certificate |
May 30, 2024 | DS Group Certificate Research Program | P1 | dos_attack | View Certificate |
May 30, 2024 | DS Group Certificate Research Program | P3 | other | View Certificate |
May 30, 2024 | DS Group Certificate Research Program | P1 | other | View Certificate |
May 30, 2024 | DS Group Certificate Research Program | P1 | other | View Certificate |
May 30, 2024 | DS Group Certificate Research Program | P1 | other | View Certificate |
May 28, 2024 | DS Group Certificate Research Program | P1 | other | View Certificate |
May 28, 2024 | DS Group Certificate Research Program | P1 | dos_attack | View Certificate |
May 28, 2024 | DS Group Certificate Research Program | P5 | clickjacking | View Certificate |
May 28, 2024 | DS Group Certificate Research Program | P1 | dos_attack | View Certificate |
This graph shows the trend of bug bounty submissions by week. Each point on the graph represents the total number of submissions in a given week.
This graph illustrates the distribution of reported vulnerabilities by severity level. Each bar represents the count of reports for a particular severity, providing insight into the types of vulnerabilities being identified.