Coordinated and Responsible Vulnerability Disclosure Free Bug Bounty Program 454,221 coordinated disclosures
242,780 fixed vulnerabilities
601 bug bounties with 1221 websites
12,269 researchers, 960 honor badges

JPMinty | Security Researcher Profile


Security researcher JPMinty has already helped fix 13 vulnerabilities.



Researcher reputation:  0

Real name:
Jai Minton

About me:
Cyber Security Professional. My aim is to make security an integral part of our future and to make this as engaging as possible.

Feel free to have a chat so we can work together to fix any issues you may have.

My current website is: https://www.jaiminton.com/

How to contact me:
You can contact me via the Open Bug Bounty Project, or if this fails reach out via Twitter.
Failing this I can be contacted at:
mintsec [@] outlook [dot] com

Award / Bug Bounty I prefer:
A recommendation or donation is appreciated https://www.paypal.me/jaiminton

Anything you wish to provide is a bonus, but not required.

Follow me on:
Twitter

Recommendations and Acknowledgements

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:30
Total reports on VIP sites:2
Total patched vulnerabilities:13
Active since:28.10.2016



No posts in blog yet


Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
05.02.2019
unpatched
Cross Site Scripting
05.02.2019
unpatched
Cross Site Scripting
05.02.2019
unpatched
Cross Site Scripting
05.02.2019
unpatched
Cross Site Scripting
05.02.2019
unpatched
Cross Site Scripting
05.02.2019
unpatched
Cross Site Scripting
05.02.2019
unpatched
Cross Site Scripting
05.02.2019
unpatched
Cross Site Scripting
05.02.2019
unpatched
Cross Site Scripting
05.02.2019
unpatched
Cross Site Scripting
05.02.2019
patched
Cross Site Scripting
05.02.2019
unpatched
Cross Site Scripting
25.04.2018
unpatched
Cross Site Scripting
08.11.2016
unpatched
Open Redirect
08.11.2016
unpatched
Open Redirect
08.11.2016
patched
Cross Site Scripting
08.11.2016
unpatched
Cross Site Scripting
02.11.2016
patched
Cross Site Scripting
02.11.2016
patched
Cross Site Scripting
02.11.2016
patched
Cross Site Scripting

  Latest Patched

 19.10.2019 day.az
 18.10.2019 thepiratebay10.org
 18.10.2019 ittefaq.com.bd
 18.10.2019 tutorialspoint.com
 18.10.2019 meteoprog.ua
 18.10.2019 atbmarket.com
 18.10.2019 karar.com
 18.10.2019 wine-searcher.com
 17.10.2019 smartbox.com
 17.10.2019 mightytext.net

  Latest Blog Posts

17.10.2019 by geeknik
The "S" in IOT is for Security
16.10.2019 by darknetguy
Best XSS Vectors
01.10.2019 by Renzi25031469
#Security 100%
18.09.2019 by Leon
SSRF | Reading Local Files from DownNotifier server
13.09.2019 by drok3r
Collection of information | Google Hacking and Dorks basic

  Recent Recommendations

    18 October, 2019
     Cineca1969:
Thank you 0xrocky for identifying a vulnerability and making us aware of it. Great security researcher to work with. Keep up the good work!
    17 October, 2019
     CosimoGdM:
A kudos to 0xrocky for his professional work in not using the identified vulnerabilities and alerting us
    17 October, 2019
     tschipie:
Thanks for the hint :)
Good work.
    17 October, 2019
     nickinckin:
Thanks to 0xrocky for identifying the vulnerability. Now we patched the vulnerability.
    17 October, 2019
     cloudrexx:
Thank you very much for making us aware of the issue and providing us a high quality vulnerability report which helped us identify the source of the vulnerability right away.