Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
534,461 coordinated disclosures
334,843 fixed vulnerabilities
786 bug bounties with 1,554 websites
16,005 researchers, 1101 honor badges

_PoisoN_BlEedinG_ | Security Researcher Profile


Security researcher _PoisoN_BlEedinG_ has already helped fix 114 vulnerabilities.



Researcher reputation:  30

Real name:
Shivam Pravin Khambe

How to contact me:
[email protected]

Alternative Contacts:
[email protected]

Experience in Application Security
< 1 year

Halls of Fame:
1 :- https://www.first.org/about/bugs
2 :- https://www.theemaillaundry.com/responsible-disclosure/
3 :- https://unite.un.org/content/hall-fame
4 :- https://www.springernature.com/gp/info/disclosure

Follow me on:
Twitter
LinkedIn

Recommendations and Acknowledgements

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:404
Total reports on VIP sites:14
Total patched vulnerabilities:114
Total vulnerabilities on Hold (Open Bug Bounty):2
Active since:15.01.2019

Open Bug Bounty Certificate





No posts in blog yet


Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
17.04.2020
On Hold
Cross Site Scripting
09.04.2020
On Hold
Cross Site Scripting
30.12.2019
unpatched
Cross Site Scripting
30.12.2019
unpatched
Cross Site Scripting
30.12.2019
unpatched
Cross Site Scripting
30.12.2019
unpatched
Cross Site Scripting
30.12.2019
unpatched
Cross Site Scripting
30.12.2019
unpatched
Cross Site Scripting
30.12.2019
unpatched
Cross Site Scripting
30.12.2019
unpatched
Cross Site Scripting
30.12.2019
unpatched
Cross Site Scripting
30.12.2019
unpatched
Cross Site Scripting
30.12.2019
unpatched
Cross Site Scripting
24.12.2019
patched
Improper Access Control 
24.12.2019
patched
Improper Access Control 
20.12.2019
patched
Cross Site Scripting
16.12.2019
unpatched
Cross Site Scripting
16.12.2019
patched
Cross Site Scripting
16.12.2019
patched
Cross Site Scripting
16.12.2019
unpatched
Cross Site Scripting

  Latest Patched

 02.06.2020 senate.la.gov
 02.06.2020 lra.louisiana.gov
 02.06.2020 upm.es
 02.06.2020 deakin.edu.au
 01.06.2020 fullkade.com
 01.06.2020 gamemodding.com
 01.06.2020 deezer.com
 01.06.2020 iienstitu.com
 01.06.2020 ac-grenoble.fr

  Latest Blog Posts

04.04.2020 by Rando02355205
(Alibaba) message.alibaba.com [IDOR] - [Bug Bounty]
12.03.2020 by Rando02355205
(Paypal) www.paypal.com [CSP High Level] - [XSS Reflected] - [Bug Bounty] - [Write Up]
08.03.2020 by CybeReports
JDECO.net XSS Vulnerability| CybeReports
29.02.2020 by Rando02355205
(Google) groups.google.com - [Stored XSS] - [Bug Bounty] - [WriteUp] - [24/02/2020]
10.02.2020 by 0xrocky
Stored XSS on h2biz.net

  Recent Recommendations

    2 June, 2020
     leshaqe:
Thank you for making the web a better place. Professional and helpful contact.
    2 June, 2020
     PaulSaraber:
Thanks for reporting the vulnerability, and the detailed explanation of the mechanism and possible effects. This really contibuted to a quick resolution, the site developer exactly knew where to find and how t fix the issue.

All fixed, many thanks
    1 June, 2020
     atau10614405:
Thanks Aaryan for reporting the vulnerability about xxs.
We will soon fix the problem
    31 May, 2020
     nidapo5:
Brilliant detection of two devious vulnerabilities, with clear explanations which meant I was able to fix both of them very quickly. Many many thanks
    28 May, 2020
     georgekgk:
Thank you Daniel for helping us to find and fix that security issue!