Coordinated and Responsible Vulnerability Disclosure Free Bug Bounty Program 475,519 coordinated disclosures
255,887 fixed vulnerabilities
634 bug bounties with 1261 websites
12,970 researchers, 996 honor badges

JPMinty | Security Researcher Profile


Security researcher JPMinty has already helped fix 13 vulnerabilities.



Researcher reputation:  0

Real name:
Jai Minton

About me:
Cyber Security Professional. My aim is to make security an integral part of our future and to make this as engaging as possible.

Feel free to have a chat so we can work together to fix any issues you may have.

My current website is: https://www.jaiminton.com/

How to contact me:
You can contact me via the Open Bug Bounty Project, or if this fails reach out via Twitter.
Failing this I can be contacted at:
mintsec [@] outlook [dot] com

Award / Bug Bounty I prefer:
A recommendation or donation is appreciated https://www.paypal.me/jaiminton

Anything you wish to provide is a bonus, but not required.

Follow me on:
Twitter

Recommendations and Acknowledgements

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:30
Total reports on VIP sites:2
Total patched vulnerabilities:13
Active since:28.10.2016



No posts in blog yet


Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
05.02.2019
unpatched
Cross Site Scripting
05.02.2019
unpatched
Cross Site Scripting
05.02.2019
unpatched
Cross Site Scripting
05.02.2019
unpatched
Cross Site Scripting
05.02.2019
unpatched
Cross Site Scripting
05.02.2019
unpatched
Cross Site Scripting
05.02.2019
unpatched
Cross Site Scripting
05.02.2019
unpatched
Cross Site Scripting
05.02.2019
unpatched
Cross Site Scripting
05.02.2019
unpatched
Cross Site Scripting
05.02.2019
patched
Cross Site Scripting
05.02.2019
unpatched
Cross Site Scripting
25.04.2018
unpatched
Cross Site Scripting
08.11.2016
unpatched
Open Redirect
08.11.2016
unpatched
Open Redirect
08.11.2016
patched
Cross Site Scripting
08.11.2016
unpatched
Cross Site Scripting
02.11.2016
patched
Cross Site Scripting
02.11.2016
patched
Cross Site Scripting
02.11.2016
patched
Cross Site Scripting

  Latest Patched

 10.12.2019 ananzi.co.za
 10.12.2019 gelbeseiten.de
 09.12.2019 brickset.com
 09.12.2019 burdastyle.ru
 09.12.2019 newtonnc.gov
 09.12.2019 gilacountyaz.gov
 09.12.2019 teamunify.com
 09.12.2019 karar.com
 09.12.2019 sd26.senate.ca.gov

  Latest Blog Posts

30.11.2019 by IAMMUSTAFAQADRI
How to hack an app: 8 best practices for pen testing mobile apps
27.11.2019 by TahakhanTaha
Reflected xss in 360totalsecurity
21.11.2019 by TahakhanTaha
blind xss in apple
30.10.2019 by Nep_1337_1998
Denial of Service vulnerability in script-loader.php (CVE-2018-6389)
17.10.2019 by 0xrocky
Stored XSS

  Recent Recommendations

    9 December, 2019
     TristanGuiheux:
Kenan G. has helped us to find and fix some issues on web sites we're protecting. This kind of help is greatly appreciated from a security perspective. This way we can improve ourselves and protect our customers. Thanks again in my name.
    6 December, 2019
     r0m01736939:
Thank you for your report. I was able to fix it quickly :)
    6 December, 2019
     Buchabstauber:
We would like to thank you for your valuable contribution in finding the XSS issue on our site! You have been very helpful!
    4 December, 2019
     fablabc:
Thanks for reporting a high risky issue to me. You are awesome
    4 December, 2019
     lbl_jd:
Gh05tPT found a XSS vulnerability on our site which I was able to fix quite quickly. Thanks for your help.