Infosec Institute

Open Bug Bounty mentioned in the
Top 6 Bug Bounty programs of
2022 by the InfoSec Institute

The Hacker News

Open Bug Bounty named among the
Top 5 Bug Bounty programs of 2021
by The Hacker News

Platform update: please use our new authentication mechanism to securely use the Open Bug Bounty Platform.
For security researchers
Report a Vulnerability
Submit, help fixing, get kudos.
For website owners
Start a Bug Bounty
Run your bounty program for free.
1,704,749 coordinated disclosures
1,383,436 fixed vulnerabilities
1,991 bug bounty programs, 3,919 websites
47,068 researchers, 1,651 honor badges

ANS | Security Researcher Profile


Security researcher ANS has already helped fix 453 vulnerabilities.



Researcher reputation:  530

Real name:
Ayan Saha

About me:
--> Hey I'm 20 years old Information Security Enthusiast, Bug Bounty Hunter, Google Assistant Action Developer from India.

Note :- If You Fixed Your Website Vulnerability, Please Don't Forget To Give Me Recommendations and Acknowledgements In My Open Bug Bounty Profile.

Contact email:
--> [email protected]
All communication will be kept private.
Feel free to contact me, I will try to answer as fast as possible.
You can also send a message on twitter.

Alternative Contacts:
--> [email protected]

Certifications & Diplomas:
B.Tech in Electrical Engineering
Diploma in Information Security

Experience in Application Security
< 1 year

Award / Bug Bounty I prefer:
- Recommend here on my profile (it's free!)
- Acknowledgement Letter
- Hall of Fame , Swags
------
Paypal - [email protected]
-----
- paypal.me/bsaha847
-----

Halls of Fame:
Listed in 100 plus Hall of Fames including Google , 20 Appreciation Letters

Follow me on:
Twitter
Facebook
LinkedIn

Ethics and Rules:
Ayan Saha is required to abide by the ethics and rules of the Open Bug Bounty project. If you reasonably believe that rules are not respected, please report this to us.

Recommendations and Acknowledgements | Full List:

@BountyNeuvoo     10 October, 2019
    Twitter BountyNeuvoo Raed from Neuvoo:
Dear,

Thank you for participating in our responsible disclosure program.

You helped us to solve a security vulnerability by informing us directly and delivering comprehensible examples.

We greatly appreciate your assistance in helping us maintain the security of our services.

Best regards
@watergateweb     1 October, 2019
    Twitter watergateweb Alexios Tsiaparas from Watergate:
Thanks Ayan for disclosing the vulnerability to us. Your documentation helped us locate the problem easily and fix it
@EricDsw     25 September, 2019
    Twitter EricDsw Eric M from berlin:
Ayan is professional and diligent in investigating vulnerabilities. Thanks for identifying XSS vulnerability on our websites, without his help we couldn't locate it or even solve it. We thank him very much for that! I'm sorry it took us so long to post your recommendation, lots of vacation times at the moment..
@Ott1m1sta     25 September, 2019
    Twitter Ott1m1sta Oleg from freelance:
Big thanks got to Rooghz for spotting a vulnerability in one of my websites.
@fourhundredkg     25 September, 2019
    Twitter fourhundredkg 400kg from aim400kg:
Thanks for telling me about the existence of clickjacking vulnerability, especially on my site. Using your information was not difficult to fix it for me.
@fparisot     25 September, 2019
    Twitter fparisot Fabrice PARISOT from FPNET.FR:
Thank you for your time hunting bugs and pointing this vulnerability. Website is patched now
@JamieForster     17 September, 2019
    Twitter JamieForster JamieEff from Motley:
Thank you for your email advising us of the vulnerability. With your kind help we have fixed the vulnerability.

Your service was very kind and helpful

Kind regards
@AppSecWebMaster     12 September, 2019
    Twitter AppSecWebMaster Jürgen from AppSec GmbH:
Dear Ayan,

I would like to thank you for your nice and valuable contribution in finding multiple website security issues. Your message helps us to raise the security level of our service.
There should be more ethical White Hat hackers like you. Only in this way can we make the network a better place.

Best regards
Jürgen Hoebarth
Information Security Engineer
AppSec GmbH, Dresden
@euvtechnology     11 September, 2019
    Twitter euvtechnology SecTeam from Engel & Völkers Technology GmbH:
Thank you a lot for reporting a vulnerability on our landing page! The included PoC and detailed description were very helpful and the vulnerability was fixed successfully.
Much appreciated, keep up the great work!
@christopherbolt     10 September, 2019
    Twitter christopherbolt Chris from ChristopherBolt.Com:
Thanks for the vulnerability report! Your report was professional, clearly explained and detailed, explaining what was wrong and what needed to be changed. It allowed me to address the issues quickly. Thanks for providing such a helpful service!
@hitsteps     10 September, 2019
    Twitter hitsteps Armin from Hitsteps:
Thank you for writing such a detailed information about issue you have found in our system, and full explanation about why it is so important to fix this issues.
@testmynet     10 September, 2019
    Twitter testmynet CA3LE from TestMy.net:
Thank you for taking the time to help with that vulnerability and extra thank you for confirming the fix worked.
@ziduniwien     4 September, 2019
    Twitter ziduniwien Computer Center from University of Vienna:
Dear Rooghz,

The University of Vienna would like to thank you for your valuable contribution in finding multiple website security issues. Your input is highly welcome and helps to raise the security level of our educational institution.

Servus and greetings from Vienna, Austria.
@TucWebmaster     30 August, 2019
    Twitter TucWebmaster TUCWebmaster from TU Chemnitz:
Thank you for your detailed report about information disclosure. With our distributed web author structure it helps a lot getting external hints.
@SelectLine_GmbH     21 August, 2019
    Twitter SelectLine_GmbH Web-Team from SelectLine Software GmbH:
Thank you, Rooghz, for pointing out a vulnerability on one of our websites.
@earth_ref     27 July, 2019
    Twitter earth_ref EarthRef from EarthRef:
Hello,

Thank you very much for your time and efforts documenting the issues. We will work on fixing these issues today.

We greatly appreciate your assistance in helping us maintain the security of our services and our user's information.
Currently Bug Bounty program is not fully live and hall of fame section to be added shortly.
We will send you a T-shirt or some other swag.

Thanks again for submitting these issues and helping us improve our application security.

Best regards and happy bug hunting!
@rtvde     25 July, 2019
    Twitter rtvde rtv.de from rtv media group GmbH:
Thank you a lot for your fast and friendly help and the tips. We were able to mitigate the problems found. Looking forward to get in touch again, if some more issues occur (which we do not hope).
@IbassoI     20 July, 2019
    Twitter IbassoI ibasso_Security_Team from ibasso:
Thanks for the vulnerability report! The report was responsible and detailed enough to let us quickly verify and diagnose the issue, understand its impact, and fix it quickly. Ayan was reacting in lightning speed once I contacted him. He explained the issue to me very clear and provided a comprehensive amount of possible solutions. This was really great service, thanks so much!
@nitrc_info     18 July, 2019
    Twitter nitrc_info NITRC Team from NITRC:
Thanks to Rooghz for a detailed report of vulnerabilities and recommendations!
@absoluteanime     2 November, 2019
    Twitter absoluteanime Ken from absoluteanime:
Thanks for letting me know about the vulnerability so I could get it fixed
@runlevelone     25 September, 2019
    Twitter runlevelone Per :
Thanks for your time spent on hunting vulnerabilities on my site bends.se!
@VKimWandel     25 September, 2019
    Twitter VKimWandel Andy :
Thank you to help the web is now a little bit saver. You found clickjacking Vulnerability on my website. No it should be closed!
@JackLo31157803     18 September, 2019
    Twitter JackLo31157803 Hub Team from HKU Libraries:
Thank you for help on notifying us on the vulnerability in our website.
@AndyMyersAU     13 September, 2019
    Twitter AndyMyersAU Andrew Myers from RISE:
Thank you Rooghz for identifying a vulnerability on our site.
@testmynet     10 September, 2019
    Twitter testmynet Damon from TestMy.net:
Thank you for taking the time to help with that vulnerability and extra thank you for confirming the fix worked.
@primehalo     3 September, 2019
    Twitter primehalo Ken from absoluteanime:
Thanks for the notice!
@primehalo     30 August, 2019
    Twitter primehalo Ken from absoluteanime:
Thanks for pointing out the potential clickjacking vulnerability!
@NewLineHorizon1     3 August, 2019
    Twitter NewLineHorizon1 Melisa from NewLineHorizon:
Dear,

Thanks for participating in responsible disclosure program.
The reports you submitted were extremely helpful to our team and provided us the details we needed to resolve the issues that you identified.
We are deeply committed to provide a safe and secure experience to our users and are therefore grateful for your efforts to help us improve our services.

Best Regards!
@IbassoI     26 July, 2019
    Twitter IbassoI ibasso_Security_Team from ibasso:
Dear Ayan,

Thanks for reporting again, you helped us a lot - fixed.

Kind Regards.
@opensolr     18 June, 2019
    Twitter opensolr Ciprian Dimofte from Opensolr SRL:
Thank you for your notification and helping us build a safer environment for our users!
@technotifier1     13 June, 2019
    Twitter technotifier1 Aniket from Technotifier:
Dear Rooghz,
Thank you for your notification about our Improper access Control. Your notification was brief and to the point, providing us with good information so we could confirm and reproduce the report.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Secured Websites Badge
50+ Secured Websites Badge
500+ Secured Websites Badge
Web Security Veteran Badge
10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser Badge
CSRF Master Badge
AppSec Logic Master Badge
Fastest Fix Badge
WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB Badge
OBB Advocate Badge
Improved OBB Badge
Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master Badge
Patch Guru Badge
Patch Lord Badge
Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE Badge
FAMOUS Badge
GLOBALLY TRUSTED Badge
REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

Distinguished Blog Author Badge
Distinguished Blog Author Badge
Distinguished Blog Author Badge
1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:480
Total reports on VIP sites:66
Total patched vulnerabilities:453
Recommendations received:31
Active since:12.05.2019

Open Bug Bounty Certificate


Researcher Certificate

Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

  Latest Patched

 26.04.2024 news.gov.mb.ca
 26.04.2024 mdanderson.org
 25.04.2024 seeu.edu.mk
 25.04.2024 xaxim.sc.gov.br
 25.04.2024 lacerdopolis.sc.gov.br
 24.04.2024 tap.mk.gov.lv
 23.04.2024 data.aad.gov.au
 23.04.2024 bitporno.to
 23.04.2024 sys01.lib.hkbu.edu.hk
 23.04.2024 srvm.gov.za

  Latest Blog Posts

04.12.2023 by BAx99x
Unmasking the Power of Cross-Site Scripting (XSS): Types, Exploitation, Detection, and Tools
04.12.2023 by a13h1_
$1120: ATO Bug in Twitter’s
04.12.2023 by ClumsyLulz
How I found a Zero Day in W3 Schools
04.12.2023 by 24bkdoor
Hack the Web like a Pirate: Identifying Vulnerabilities with Style
04.12.2023 by 24bkdoor
Navigating the Bounty Seas with Open Bug Bounty

  Recent Recommendations

    22 April, 2024
    genoverband:
Thank you for your invaluable help in ensuring the security of our domain and its visitors!
    10 April, 2024
    Mars:
Hatim uncovered a XSS bug that we were able to quickly resolve. Thanks very much for your assistance and help.
    8 April, 2024
    Panthermedia:
Thanks to the support of Hatim Chabik, we were able to identify and solve an XSS bug.
    5 April, 2024
    pubpharm:
Pooja found a XSS vulnerability on our website and provided us with the needed Information for replication and fixing the issue. Which she verified afterwards.
We thank her for the reporting and assistance.
    2 April, 2024
    genoverband:
Thank you for your invaluable help in ensuring the security of our domain and its visitors!