Sumit Jain - Profile | Com Olho

Sumit Jain

sumitcfe
Last Login: Tue, 17 Sep 2024 13:05:08
Gender: Male
Age: 31-50
Hacking Level: Advance
Top 1%
Qualification: Graduation
Status: Employed

Badges

See all

Bug Bounty Status Distribution

Vulnerability Types

Journey

Wed, Feb 28, 2024

Joined Community

Joined the community for the first time. Welcome to Com Olho!

03:23 PM

Com Olho

Fri, Mar 01, 2024

First Bug Bounty Report

First Bug Bounty Report: Exam Prep Tool Security Research Reward

12:48 PM

Exam Prep Tool

Tue, Mar 05, 2024

First Rewarded Bug Bounty

First Rewarded Bug Bounty: Exam Prep Tool Security Research Reward

04:15 PM

Exam Prep Tool

Researcher's Skills

This table provides an overview of the researcher's skills, tools, interests, learning goals, styles, and security focuses.

Category Details
Tools Used
  • Web Vulnerability Scanners Network Analysis Tools Penetration Testing Frameworks Other
Hacking Interest
  • Website Apps APIs Networks Databases
Learning Goals
  • Advance Career
Learning Style
  • Reading Hands on labs Simulations
Security Focus
  • Offensive Security Defensive Security Compliance Threat Intelligence Other
Hall of Fame

This table showcases the achievements of researchers, highlighting the date, program name, severity, vulnerability type, and status of each rewarded report.

Date Program Name Severity Vulnerability Type Status
March 06, 2024 Exam Prep Tool Security Research Reward P4 sensitive_data_exposure Rewarded
March 06, 2024 Exam Prep Tool Security Research Reward P4 sensitive_data_exposure Rewarded
March 05, 2024 Exam Prep Tool Security Research Reward P5 sensitive_data_exposure Rewarded
Bug Bounty Submissions Over Time

This graph shows the trend of bug bounty submissions by week. Each point on the graph represents the total number of submissions in a given week.

Severity Of Reported Vulnerabilities

This graph illustrates the distribution of reported vulnerabilities by severity level. Each bar represents the count of reports for a particular severity, providing insight into the types of vulnerabilities being identified.