Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
584,541 coordinated disclosures
375,697 fixed vulnerabilities
893 bug bounties with 1,783 websites
18,175 researchers, 1182 honor badges

ANS | Security Researcher Profile


Security researcher ANS has already helped fix 452 vulnerabilities.



Researcher reputation:  530

Real name:
Ayan Saha - Allinone Cyberteam Pvt Ltd.

About me:
--> Hey I'm 20 years old Information Security Enthusiast, Bug Bounty Hunter, Google Assistant Action Developer from India.

Note :- If You Fixed Your Website Vulnerability, Please Don't Forget To Give Me Recommendations and Acknowledgements In My Open Bug Bounty Profile.

How to contact me:
--> [email protected]
All communication will be kept private.
Feel free to contact me, I will try to answer as fast as possible.
You can also send a message on twitter.

Alternative Contacts:
--> [email protected]

Certifications & Diplomas:
Cryptography, (ISC)2
Cybersecurity and Mobility, University System of Georgia

Experience in Application Security
< 1 year

Award / Bug Bounty I prefer:
- Recommend here on my profile (it's free!)
- Acknowledgement Letter
- Hall of Fame , Swags
------
Paypal - [email protected]
-----
- paypal.me/bsaha847
-----

Halls of Fame:
Listed in 100 plus Hall of Fames including Google , 20 Appreciation Letters

Follow me on:
Twitter
Facebook
LinkedIn

Recommendations and Acknowledgements

@BountyNeuvoo     10 October, 2019
    Twitter BountyNeuvoo Raed from Neuvoo:
Dear,

Thank you for participating in our responsible disclosure program.

You helped us to solve a security vulnerability by informing us directly and delivering comprehensible examples.

We greatly appreciate your assistance in helping us maintain the security of our services.

Best regards
@watergateweb     1 October, 2019
    Twitter watergateweb Alexios Tsiaparas from Watergate:
Thanks Ayan for disclosing the vulnerability to us. Your documentation helped us locate the problem easily and fix it
@EricDsw     25 September, 2019
    Twitter EricDsw Eric M from berlin:
Ayan is professional and diligent in investigating vulnerabilities. Thanks for identifying XSS vulnerability on our websites, without his help we couldn't locate it or even solve it. We thank him very much for that! I'm sorry it took us so long to post your recommendation, lots of vacation times at the moment..
@Ott1m1sta     25 September, 2019
    Twitter Ott1m1sta Oleg from freelance:
Big thanks got to Rooghz for spotting a vulnerability in one of my websites.
@fourhundredkg     25 September, 2019
    Twitter fourhundredkg 400kg from aim400kg:
Thanks for telling me about the existence of clickjacking vulnerability, especially on my site. Using your information was not difficult to fix it for me.
@fparisot     25 September, 2019
    Twitter fparisot Fabrice PARISOT from FPNET.FR:
Thank you for your time hunting bugs and pointing this vulnerability. Website is patched now
@JamieForster     17 September, 2019
    Twitter JamieForster JamieEff from Motley:
Thank you for your email advising us of the vulnerability. With your kind help we have fixed the vulnerability.

Your service was very kind and helpful

Kind regards
@AppSecWebMaster     12 September, 2019
    Twitter AppSecWebMaster Jürgen from AppSec GmbH:
Dear Ayan,

I would like to thank you for your nice and valuable contribution in finding multiple website security issues. Your message helps us to raise the security level of our service.
There should be more ethical White Hat hackers like you. Only in this way can we make the network a better place.

Best regards
Jürgen Hoebarth
Information Security Engineer
AppSec GmbH, Dresden
@euvtechnology     11 September, 2019
    Twitter euvtechnology SecTeam from Engel & Völkers Technology GmbH:
Thank you a lot for reporting a vulnerability on our landing page! The included PoC and detailed description were very helpful and the vulnerability was fixed successfully.
Much appreciated, keep up the great work!
@christopherbolt     10 September, 2019
    Twitter christopherbolt Chris from ChristopherBolt.Com:
Thanks for the vulnerability report! Your report was professional, clearly explained and detailed, explaining what was wrong and what needed to be changed. It allowed me to address the issues quickly. Thanks for providing such a helpful service!

Shows the first 10 recommendations. See all.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Secured Websites Badge
50+ Secured Websites Badge
500+ Secured Websites Badge
Web Security Veteran Badge
10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser Badge
CSRF Master Badge
AppSec Logic Master Badge
Fastest Fix Badge
WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB Badge
OBB Advocate Badge
Improved OBB Badge
Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master Badge
Patch Guru Badge
Patch Lord Badge
Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE Badge
FAMOUS Badge
GLOBALLY TRUSTED Badge
REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

Distinguished Blog Author Badge
Distinguished Blog Author Badge
Distinguished Blog Author Badge
1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:479
Total reports on VIP sites:66
Total patched vulnerabilities:452
Recommendations received:31
Active since:12.05.2019

Open Bug Bounty Certificate


Researcher Certificate

Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
30.11.2019
patched
Cross Site Scripting
09.10.2019
patched
Improper Access Control 
09.10.2019
patched
Improper Access Control 
09.10.2019
patched
Improper Access Control 
09.10.2019
patched
Improper Access Control 
09.10.2019
patched
Improper Access Control 
09.10.2019
patched
Improper Access Control 
09.10.2019
patched
Improper Access Control 
09.10.2019
patched
Improper Access Control 
09.10.2019
patched
Improper Access Control 
29.09.2019
unpatched
Cross Site Scripting
26.09.2019
patched
Cross Site Scripting
26.09.2019
patched
Cross Site Scripting
26.09.2019
patched
Cross Site Scripting
26.09.2019
unpatched
Cross Site Scripting
26.09.2019
unpatched
Cross Site Scripting
26.09.2019
unpatched
Cross Site Scripting
26.09.2019
unpatched
Cross Site Scripting
26.09.2019
unpatched
Cross Site Scripting
24.09.2019
patched
Cross Site Scripting

  Latest Patched

 24.09.2020 silhouetteamerica.com
 23.09.2020 heute.at
 23.09.2020 fssai.gov.in
 23.09.2020 wired.com
 23.09.2020 instadp.com
 23.09.2020 hoc24.vn
 23.09.2020 korg.com
 22.09.2020 yeggi.com
 22.09.2020 pearltrees.com

  Latest Blog Posts

14.09.2020 by aninda_anon
VPS Cheatsheet for bug hunting
14.09.2020 by pk_12397
A Story of IDOR To Account Takeover
14.09.2020 by febin_rev
How to find valid and impactful CSRFs
14.09.2020 by _r00t1ng_
Using {XSS} to play games on Site
24.06.2020 by Gkexamquiz
How to Find Contacts To Report Bugs &amp; Security Vulnerabilities | Bug Bounty Tutorials 2020

  Recent Recommendations

@TinNguy54963117     23 September, 2020
    Twitter TinNguy54963117:
Thank you for the accurate and quick response in disclosing our vulnerability. This was done in a professional and responsible manner through the bug bounty program, giving us time to remediate.
@judythai     22 September, 2020
    Twitter judythai:
Thank you, Pankaj, for sending such a detailed report to help us reproduce and fix a security issue. You were also very responsive to our follow-up. Appreciate your work!
@Fla_ke     22 September, 2020
    Twitter Fla_ke:
HowardPotts provided us some useful information about a potential security problem on our main website. He quickly answered all our questions. Thks!
@MalagaCarCom     22 September, 2020
    Twitter MalagaCarCom:
Thank you very much, now our website is more secure.
@kitnospt     22 September, 2020
    Twitter kitnospt:
Thanks for all the help and detailed reporting