Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
742,962 coordinated disclosures
436,913 fixed vulnerabilities
1147 bug bounties with 2,199 websites
20,617 researchers, 1257 honor badges

Nep_1337_1998 | Security Researcher Profile

Security researcher Nep_1337_1998 has already helped fix 561 vulnerabilities.

Researcher reputation:  130

Real name:
Pankaj Thakur

About me:
Security Researcher Penetration tester at HackerOne Certified Ethical Hacker OSCP OSWP

How to contact me:
email: [email protected]

Alternative Contacts:
[email protected]

Certifications & Diplomas:

Experience in Application Security
< 1 year

Award / Bug Bounty I prefer:
If you think, i helped you to make your website secure, don't let my hard-work waste.Please help with
>> monetary bounty (paypal)
>> at-least recommend me on my openbugbounty profile :)

Halls of Fame:
... etc

Follow me on:

Recommendations and Acknowledgements

@OnePlusSecurity     21 October, 2019
    Twitter OnePlusSecurity Security Team from OnePlus:
Many thanks to Pankaj for alerting us to a vulnerability in our website, and suggesting ways of fixing it. Great work!
@judythai     22 September, 2020
    Twitter judythai J Thai from University of California:
Thank you, Pankaj, for sending such a detailed report to help us reproduce and fix a security issue. You were also very responsive to our follow-up. Appreciate your work!
@rfrancis     11 March, 2020
    Twitter rfrancis Russ Smith from Oklahoma State University:
Thanks for the prompt reply and information on what, fortunately, turned out to be no big deal but could readily have been one. Much appreciated.
@firoz0211     7 February, 2020
    Twitter firoz0211 Firoz Pathan from UA:
Pankaj is very helpful and send us detailed information about an important security issue. Thanks a lot Pankaj :)
@TheLinx     7 February, 2020
    Twitter TheLinx Linus from
Very fast and detailed communication helped solve a vulnerability in a short time.
@firoz0211     6 February, 2020
    Twitter firoz0211 Firoz Pathan from UA:
Pankaj is very helpful. He helped us for an important security issue and thanks to him our website is now secured.
@UwTableau     16 January, 2020
    Twitter UwTableau UW Tableau from University of Washington:
Thank you to Pankaj Thakur. Because of their vulnerability report, we were able to resolve a vulnerability in a timely manner, and his willingness to respond to followup is GREATLY appreciated.
@PaulMar23292621     14 October, 2019
    Twitter PaulMar23292621 Responsible Disclosure from A1 Telekom Austria:
Pankaj Thakur sent us a good report, so we were quickly able to reproduce and fix the issue. Thank you very much for the good work.
Best regards,
RD @ A1

Please login via Twitter to add a recommendation

Honor Badges

Number of Secured Websites

10+ Secured Websites Badge
50+ Secured Websites Badge
500+ Secured Websites Badge
Web Security Veteran Badge
10+ Websites
50+ Websites
500+ Websites
1000+ Websites

Advanced Security Research

WAF Bypasser Badge
CSRF Master Badge
AppSec Logic Master Badge
Fastest Fix Badge
WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB Badge
OBB Advocate Badge
Improved OBB Badge
Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master Badge
Patch Guru Badge
Patch Lord Badge
Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

10+ Recommends
25+ Recommends
50+ Recommends

Distinguished Blog Author

Distinguished Blog Author Badge
Distinguished Blog Author Badge
Distinguished Blog Author Badge
1 Post
3 Posts
5+ Posts

Research Statistics

Total reports:620
Total reports on VIP sites:21
Total patched vulnerabilities:561
Recommendations received:8
Active since:29.04.2019

Open Bug Bounty Certificate

Researcher Certificate

30.10.2019  Denial of Service vulnerability in script-loader.php (CVE-2018-6389)

The load-scripts.php file receives a parameter called load[], the parameter value is 'jquery-ui-core'. In the response, I received the JS module 'jQuery UI Core' that was requested

  What can be concluded from this URL, is that it is probably meant to supply users with some JS modules. In addition, the load[] parameter is an array, which means that it is possible to provide multiple values and be able to get multiple JS modules within the response.

   I wondered what would happen if I sent the server a request to supply me every JS module that it stored? A single request would cause the server to perform 181 I/O actions and provide the file contents in the response.

So I tried it, I sent the request to the server:

The server responded after 2.2 seconds, with almost 4MB of data, which made the server work really hard to process such a request.

Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

  Latest Patched


  Latest Blog Posts

25.12.2020 by _Y000_
How to bypass mod_security (WAF)
10.12.2020 by _Y000_
sql injection to bypass Mod_Security
10.12.2020 by _Y000_
Create encoded sql payloads
26.10.2020 by _r00t1ng_
Bypass Addslashes using Multibyte Character
26.10.2020 by _r00t1ng_
One Payload to Inject them all - MultiQuery Injection

  Recent Recommendations

@yuhiguchi1     20 January, 2021
    Twitter yuhiguchi1:
We appliciate your help with the vulnerability.
The response to inquiries was quick, which was very helpful.
@anTon_x3     20 January, 2021
    Twitter anTon_x3:
Thank you for finding security issues on my website! keep it up!
@rantoniazzi     19 January, 2021
    Twitter rantoniazzi:
Thanks for pointing out a public phpinfo(). Very fast contact.
@driesvanhaver     19 January, 2021
    Twitter driesvanhaver:
We were informed of a vulnerability. Thank you to Praveen for telling us it existed.
@snowdarkz     19 January, 2021
    Twitter snowdarkz:
Thank you very much for the help with the vulnerability. Very fast contact.