Badges
See allBug Bounty Status Distribution
Vulnerability Types
Journey
Tue, Jul 16, 2024
Joined the community for the first time. Welcome to Com Olho!
08:58 PM
Com Olho
Fri, Aug 23, 2024
First Bug Bounty Report: Flipkart Responsible Disclosure Program
03:35 PM
Flipkart
Fri, Aug 23, 2024
First Rewarded Bug Bounty: ELAN Limited Bug Bounty Program
09:36 PM
ELAN LIMITED
This table provides an overview of the researcher's skills, tools, interests, learning goals, styles, and security focuses.
Category | Details |
---|---|
Tools Used |
|
Hacking Interest |
|
Learning Goals |
|
Learning Style |
|
Security Focus |
|
This table showcases the achievements of researchers, highlighting the date, program name, severity, vulnerability type, and status of each rewarded report.
Date | Program Name | Severity | Vulnerability Type | Status |
---|---|---|---|---|
August 25, 2024 | DS Group Certificate Research Program | P4 | sensitive_data_exposure | View Certificate |
August 24, 2024 | Exam Prep Tool Security Research Reward | P4 | session_fixation | View Certificate |
August 24, 2024 | DS Group Certificate Research Program | P4 | other | View Certificate |
August 24, 2024 | DS Group Certificate Research Program | P4 | sensitive_data_exposure | View Certificate |
August 24, 2024 | DS Group Certificate Research Program | P4 | sensitive_data_exposure | View Certificate |
August 24, 2024 | DS Group Certificate Research Program | P5 | security_misconfiguration | Vulnerability Closed |
August 24, 2024 | DS Group Certificate Research Program | P4 | sensitive_data_exposure | View Certificate |
August 23, 2024 | ELAN Limited Bug Bounty Program | P5 | sensitive_data_exposure | View Certificate |
This graph shows the trend of bug bounty submissions by week. Each point on the graph represents the total number of submissions in a given week.
This graph illustrates the distribution of reported vulnerabilities by severity level. Each bar represents the count of reports for a particular severity, providing insight into the types of vulnerabilities being identified.
This graph shows the distribution of vulnerability types in successfully submitted CTFs.