Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
539,727 coordinated disclosures
347,622 fixed vulnerabilities
813 bug bounties with 1,589 websites
16,628 researchers, 1126 honor badges

LoganAyalaan | Security Researcher Profile


Security researcher LoganAyalaan has already helped fix 7 vulnerabilities.



Researcher reputation:  0

Real name:
Andreu Tomas

About me:
Ingeniera Informatica , apasionado de la (IN) seguridad informtica! #infosec #cybersecurity #hacking #pentesting #CTF #wargames

Computer Engineering Student, CyberSecurity Specialyst.

How to contact me:
Hi, you can contact me at [email protected]

Alternative Contacts:
[email protected]

Certifications & Diplomas:
2nd Course on Informatics Engineering, Ewaptx ElearnSecurity.

Experience in Application Security
1-3 years

Award / Bug Bounty I prefer:
Paypal Donations : [email protected]
For swag contact me to DM, Thank you!

Halls of Fame:
Hackerone Ranking 4200 WorldWide

Follow me on:
Twitter

Recommendations and Acknowledgements

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:16
Total patched vulnerabilities:7
Active since:03.09.2018



No posts in blog yet


Reported Vulnerabilities

All Submissions Featured Submissions

Domain Reported Status Type
10.09.2019
unpatched
Cross Site Scripting
02.12.2018
patched
Cross Site Scripting
02.12.2018
patched
Cross Site Scripting
26.11.2018
patched
Cross Site Scripting
26.11.2018
patched
Cross Site Scripting
24.11.2018
unpatched
Cross Site Scripting
24.11.2018
patched
Cross Site Scripting
23.11.2018
unpatched
Cross Site Scripting
23.11.2018
unpatched
Cross Site Scripting
23.11.2018
unpatched
Cross Site Scripting
23.11.2018
unpatched
Cross Site Scripting
23.11.2018
unpatched
Cross Site Scripting
22.11.2018
patched
Cross Site Scripting
22.11.2018
unpatched
Cross Site Scripting
22.11.2018
unpatched
Cross Site Scripting
03.09.2018
patched
Cross Site Scripting

  Latest Patched

 05.07.2020 arise.com
 05.07.2020 ica.se
 05.07.2020 mrshabanali.com
 05.07.2020 neimanmarcus.com
 05.07.2020 filmix.co
 05.07.2020 blue-tomato.com
 05.07.2020 clickme.net
 04.07.2020 yenialanya.com
 04.07.2020 the-japan-news.com
 04.07.2020 kpl.gov

  Latest Blog Posts

24.06.2020 by Gkexamquiz
How to Find Contacts To Report Bugs & Security Vulnerabilities | Bug Bounty Tutorials 2020
24.06.2020 by 0xcrypto
Improper Access Control - Generic: Unrestricted access to any "connected pack" on docs in coda.io
04.04.2020 by Rando02355205
(Alibaba) message.alibaba.com [IDOR] - [Bug Bounty]
12.03.2020 by Rando02355205
(Paypal) www.paypal.com [CSP High Level] - [XSS Reflected] - [Bug Bounty] - [Write Up]
08.03.2020 by CybeReports
JDECO.net XSS Vulnerability| CybeReports

  Recent Recommendations

    4 July, 2020
     TadeuszWiew:
Thank you for finding and reporting the vulnerability on our website.
Great job! :)
    2 July, 2020
     booksprice:
Thank you for reporting the bug, and the clear details, much appreciated.
    1 July, 2020
     matthews8000:
Manish has correctly identified a vulnerability and suggested an appropriate fix. This has lead to an improvement in the security of the website.
    1 July, 2020
     matthews8000:
Manish has correctly identified a vulnerability and suggested an appropriate fix. This has lead to an improvement in the security of the website.
    1 July, 2020
     vmarci21:
Thanks for the bug report!
This has lead to an improvement in the security of the website.