Aakash Sharma - Profile | Com Olho

Aakash Sharma

sharmaa29327
Last Login: Mon, 25 Nov 2024 01:06:12
Gender: Male
Age: 18-30
Hacking Level: Intermediate
Top 1%
Qualification: Undergraduation
Status: Freelancer

Bug Bounty Status Distribution

Vulnerability Types

Journey

Mon, May 20, 2024

Joined Community

Joined the community for the first time. Welcome to Com Olho!

12:20 AM

Com Olho

Tue, May 21, 2024

First Bug Bounty Report

First Bug Bounty Report: ELAN Limited Bug Bounty Program

01:58 PM

ELAN LIMITED

Thu, May 30, 2024

First Rewarded Bug Bounty

First Rewarded Bug Bounty: DS Group Certificate Research Program

11:42 AM

Dharampal Satyapal Limited

Researcher's Skills

This table provides an overview of the researcher's skills, tools, interests, learning goals, styles, and security focuses.

Category Details
Tools Used
  • Web Vulnerability Scanners Other
Hacking Interest
  • Website Apps APIs Databases
Learning Goals
  • Improve Skills Gain certifications
Learning Style
  • Hands on labs Webinars
Security Focus
  • Offensive Security Secure Codes Threat Intelligence
Hall of Fame

This table showcases the achievements of researchers, highlighting the date, program name, severity, vulnerability type, and status of each rewarded report.

Date Program Name Severity Vulnerability Type Status
June 30, 2024 Exam Prep Tool Security Research Reward P5 clickjacking View Certificate
June 30, 2024 Com Olho Security Research Reward Program P5 clickjacking Rewarded
May 30, 2024 Firstsales.io Bug Bounty Program P3 session_fixation View Certificate
May 30, 2024 DS Group Certificate Research Program P3 security_misconfiguration View Certificate
Bug Bounty Submissions Over Time

This graph shows the trend of bug bounty submissions by week. Each point on the graph represents the total number of submissions in a given week.

Severity Of Reported Vulnerabilities

This graph illustrates the distribution of reported vulnerabilities by severity level. Each bar represents the count of reports for a particular severity, providing insight into the types of vulnerabilities being identified.