OM DUBEY - Profile | Com Olho

OM DUBEY

omdubey170
Last Login: Fri, 15 Nov 2024 22:08:28
Gender: Male
Age: 18-30
Hacking Level: Intermediate
Top 1%
Qualification: Graduation
Status: Freelancer

Badges

See all

Bug Bounty Status Distribution

Vulnerability Types

Journey

Mon, Jul 29, 2024

Joined Community

Joined the community for the first time. Welcome to Com Olho!

10:46 PM

Com Olho

Tue, Jul 30, 2024

First Bug Bounty Report

First Bug Bounty Report: Baazi Games Bug Bounty Program

10:22 PM

Baazi Games

Tue, Jul 30, 2024

First Rewarded Bug Bounty

First Rewarded Bug Bounty: Baazi Games Bug Bounty Program

10:22 PM

Baazi Games

Researcher's Skills

This table provides an overview of the researcher's skills, tools, interests, learning goals, styles, and security focuses.

Category Details
Tools Used
  • Web Vulnerability Scanners Network Analysis Tools Penetration Testing Frameworks Exploit Development Tools Wireless Hacking Tools
Hacking Interest
  • Website Apps APIs Networks Databases Other
Learning Goals
  • Improve Skills Gain certifications Stay Updated Advance Career Networking
Learning Style
  • Reading Watching Videos Hands on labs Simulations Webinars
Security Focus
  • Offensive Security Secure Codes Compliance
Hall of Fame

This table showcases the achievements of researchers, highlighting the date, program name, severity, vulnerability type, and status of each rewarded report.

Date Program Name Severity Vulnerability Type Status
October 12, 2024 Baazi Games Bug Bounty Program P4 broken_authentication Vulnerability Closed
July 30, 2024 Baazi Games Bug Bounty Program P3 security_misconfiguration Rewarded
Bug Bounty Submissions Over Time

This graph shows the trend of bug bounty submissions by week. Each point on the graph represents the total number of submissions in a given week.

Severity Of Reported Vulnerabilities

This graph illustrates the distribution of reported vulnerabilities by severity level. Each bar represents the count of reports for a particular severity, providing insight into the types of vulnerabilities being identified.