Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
539,353 coordinated disclosures
347,298 fixed vulnerabilities
813 bug bounties with 1,589 websites
16,593 researchers, 1123 honor badges

DrStache Top Security Researcher of the Month Top VIP Security Researcher of the Month | Security Researcher Profile


Security researcher DrStache has already helped fix 2249 vulnerabilities.



Researcher reputation:  350

How to contact me:
.

Recommendations and Acknowledgements

    24 August, 2018
     Jhunnan tfaucher from LaBoutiqueOfficielle:
Merci à DrStach pour son signalement et sa réactivité pour nous apporter plus de précision, cela nous a permis de réagir rapidement.
    21 March, 2018
     poinsart Stéphane Poinsart from Enseignement Supérieur:
DrStache a identifié et signalé plusieurs failles dont nous ne soupçonnions pas l’existence. Ses informations précises avec des exemples de requêtes et sa réactivité nous ont permis de les diagnostiquer et les corriger. Merci !
    21 March, 2018
     bartmcpherson Bart from CSU:
Thank you for the help.
    20 March, 2018
     Genial_2017 jose sanchez sanchez from Mp3goo:
Excellent security specialist, I showed security problems that I did not know, thanks to he I could solve the problems on my site, highly recommended.
    27 February, 2018
     Nut_Treat Onno from Klacht.nl:
Highly skilled, excellent communication, highly recommended!
    19 July, 2017
     SimonFonteneau Simon Fonteneau from Lesfourmisduweb:
Merci a Drstache pour son signalement ! J'ai pu corriger a rapidement !
    19 July, 2017
     SMintrav SMINTRAV from MINTRAV:
Thank you DrStache, with you, we patched our issue you was extremely helpful, responsive and knowledgeable in pointing us to the Xss vulnerabilities on our websites !
    22 March, 2017
     JKrycha Josef Krycha from Canon Europe Ltd.:
DrStache reported multiple vulnerabilities in Canon websites ranging form reflected XSS's, SQL injections to information disclosure. All findings were valid and the communication with him was quick and efficient. Thank you for your help and best of luck!
    9 March, 2017
     bugfort26 NB. from CDC:
Merci pour ces échanges, qui auront permis de remotiver nos fournisseurs!
    3 March, 2017
     JNRIBETTE JN.RIBETTE from Kosmos:
Merci pour la détection des failles et pour les informations permettant de les corriger !

Shows the first 10 recommendations. See all.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:3864
Total reports on VIP sites:435
Total patched vulnerabilities:2249
Recommendations received:34
Active since:31.07.2016
Top Security Researcher Awards: Top Security Researcher of the Month Top Security Researcher of the Month Top Security Researcher of the Month
Top VIP Security Researcher Awards: Top VIP Security Researcher of the Month Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week



No posts in blog yet


Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
20.03.2018
unpatched
Cross Site Scripting
20.03.2018
patched
Cross Site Scripting
20.03.2018
patched
Cross Site Scripting
20.03.2018
patched
Cross Site Scripting
20.03.2018
unpatched
Cross Site Scripting
20.03.2018
unpatched
Cross Site Scripting
20.03.2018
patched
Cross Site Scripting
20.03.2018
unpatched
Cross Site Scripting
20.03.2018
patched
Cross Site Scripting
20.03.2018
unpatched
Cross Site Scripting
20.03.2018
unpatched
Cross Site Scripting
20.03.2018
unpatched
Cross Site Scripting
20.03.2018
unpatched
Cross Site Scripting
20.03.2018
unpatched
Cross Site Scripting
20.03.2018
unpatched
Cross Site Scripting
20.03.2018
patched
Cross Site Scripting
20.03.2018
unpatched
Cross Site Scripting
20.03.2018
unpatched
Cross Site Scripting
20.03.2018
unpatched
Cross Site Scripting
20.03.2018
unpatched
Cross Site Scripting

  Latest Patched

 04.07.2020 neimanmarcus.com
 02.07.2020 oklahoman.com
 02.07.2020 blue-tomato.com
 02.07.2020 nuigalway.ie
 02.07.2020 da.ai
 01.07.2020 conceptdraw.com
 01.07.2020 fontspring.com
 01.07.2020 globalchange.nasa.gov
 01.07.2020 njit.edu

  Latest Blog Posts

24.06.2020 by Gkexamquiz
How to Find Contacts To Report Bugs & Security Vulnerabilities | Bug Bounty Tutorials 2020
24.06.2020 by 0xcrypto
Improper Access Control - Generic: Unrestricted access to any "connected pack" on docs in coda.io
04.04.2020 by Rando02355205
(Alibaba) message.alibaba.com [IDOR] - [Bug Bounty]
12.03.2020 by Rando02355205
(Paypal) www.paypal.com [CSP High Level] - [XSS Reflected] - [Bug Bounty] - [Write Up]
08.03.2020 by CybeReports
JDECO.net XSS Vulnerability| CybeReports

  Recent Recommendations

    2 July, 2020
     booksprice:
Thank you for reporting the bug, and the clear details, much appreciated.
    1 July, 2020
     matthews8000:
Manish has correctly identified a vulnerability and suggested an appropriate fix. This has lead to an improvement in the security of the website.
    1 July, 2020
     matthews8000:
Manish has correctly identified a vulnerability and suggested an appropriate fix. This has lead to an improvement in the security of the website.
    1 July, 2020
     vmarci21:
Thanks for the bug report!
This has lead to an improvement in the security of the website.
    1 July, 2020
     vmarci21:
Thanks for the bug report!
This has lead to an improvement in the security of the website.