Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
509,056 coordinated disclosures
278,321 fixed vulnerabilities
705 bug bounties with 1,406 websites
14,427 researchers, 1060 honor badges

Codingboy | Security Researcher Profile


Security researcher Codingboy has already helped fix 13 vulnerabilities.



Researcher reputation:  0

Real name:
Viral Vaghela

About me:
18 year old Programmer
Web developer and Designer
Computer engineering student

How to contact me:
[email protected]

Experience in Application Security
1-3 years

Award / Bug Bounty I prefer:
Bug bounty payment or job / internship
Public Thanks
Recommendation
T-Shirts

Follow me on:
Twitter

Recommendations and Acknowledgements

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:18
Total reports on VIP sites:3
Total patched vulnerabilities:13
Total vulnerabilities on Hold (Open Bug Bounty):3
Active since:24.09.2018



No posts in blog yet


Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
19.02.2020
On Hold
Cross Site Scripting
04.02.2020
On Hold
Cross Site Scripting
08.01.2020
patched
Cross Site Scripting
26.12.2019
patched
Cross Site Scripting
19.12.2019
On Hold
Cross Site Scripting
16.12.2019
patched
Cross Site Scripting
11.12.2019
patched
Cross Site Scripting
07.12.2019
patched
Cross Site Scripting
07.12.2019
patched
Improper Access Control 
06.12.2019
patched
Cross Site Scripting
06.12.2019
patched
Cross Site Scripting
04.12.2019
patched
Improper Access Control 
03.12.2019
patched
Improper Access Control 
03.12.2019
patched
Cross Site Scripting
15.11.2019
patched
Improper Access Control 
24.09.2018
patched
Cross Site Scripting

  Latest Patched

 27.02.2020 hermagic.com
 27.02.2020 airmore.com
 27.02.2020 boohoo.com
 27.02.2020 jobup.ch
 27.02.2020 blue-tomato.com
 27.02.2020 fmworld.net
 27.02.2020 romadecade.org
 27.02.2020 sinematurk.com
 27.02.2020 alamedaca.gov
 27.02.2020 micvideal.es

  Latest Blog Posts

10.02.2020 by 0xrocky
Stored XSS on h2biz.net
10.02.2020 by ismailtsdln
SQL Injection Payload List
20.01.2020 by Rando02355205
XSS on "www.alibaba.com" (Alibaba WAF 405) Bypassed.
16.01.2020 by Open Bug Bounty
Brief Recap of Open Bug Bounty’s Record Growth in 2019
12.01.2020 by JCQ_47
WAF Cloudflare Bypass XSS at Nexusmods.com

  Recent Recommendations

    26 February, 2020
     LarryParker98:
Kunal, thank you for reporting the vulnerability on our web site. We greatly appreciate your help in securing our site.
    25 February, 2020
     ryra16642059:
Thanks AARYAN SAHARAN For informing us about the admin bypass vulner.
Our whole company would like to say thank you to you for helping us! We don't offer any bounty, but as a respect token , A thanks card will be sent to you over mail.
-Cheers!
    25 February, 2020
     CalvinN14532713:
Thank you so much for your hard work with our company! It was a great help and opened us up to perusing a bug bounty in the future!

KhanJanny was very helpful in identifying some vulnerabilities on our site that we were able to resolve!
    25 February, 2020
     CalvinN14532713:
Thank you so much for your hard work with our company! It was a great help and opened us up to perusing a bug bounty in the future!

KhanJanny was very helpful in identifying some vulnerabilities on our site that we were able to resolve!
    25 February, 2020
     carpoolworld:
Please update your contact information so that we can contact you.