Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
541,999 coordinated disclosures
348,518 fixed vulnerabilities
817 bug bounties with 1,595 websites
16,718 researchers, 1133 honor badges

binit | Security Researcher Profile


Security researcher binit has already helped fix 17 vulnerabilities.



Researcher reputation:  50

Real name:
Binit Ghimire

About me:
A Tech Enthusiast who loves developing and managing websites, writing blog articles, making video tutorials related to Computers and the Internet, etc.

How to contact me:
You can contact me on my Facebook page at https://www.Facebook.com/TheBinitGhimire and Facebook profile at https://www.Facebook.com/InternetHeroBINIT

Alternative Contacts:
You shall contact me via email as well: [email protected]

Certifications & Diplomas:
Graduated from Grade 12 with Science faculty.

Experience in Application Security
1-3 years

Award / Bug Bounty I prefer:
Hall of Fame, T-Shirt, Bug Bounty Payment (Wire Transfer to Nepal, Western Union, Skrill) or anything you'd like to provide.

Halls of Fame:
Facebook Whitehat (2018), Alibaba (April, 2019), Microsoft (2019), Pinterest, Atlassian Opsgenie, Indeed, USAA, etc.

Follow me on:
Twitter
Facebook
LinkedIn

Recommendations and Acknowledgements

    15 November, 2018
     corebox Jon from Corebox:
Thanks for responsibly reporting a security weakness on our website. We greatly appreciate you telling us about it.
    8 October, 2019
     ziduniwien Zentraler Informatikdienst from University of Vienna:
Dear Binit Ghimire,
The University of Vienna would like to thank you for your valuable contribution in finding multiple website security issues.
Your input is highly welcome and helps to raise the security level of our educational institution.
Servus and greetings from Vienna, Austria.
    24 April, 2019
     AniDBStatus AniDB from AniDB:
Thanks for reporting the bug. Your work is very appreciated.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:86
Total reports on VIP sites:9
Total patched vulnerabilities:17
Total vulnerabilities on Hold (Open Bug Bounty):6
Recommendations received:3
Active since:01.08.2018

24.04.2019  Stored Cross-site Scripting (XSS) vulnerability in Charitybuzz.com

How I was able to discover a Stored XSS vulnerability in Charitybuzz.com - Binit Ghimire

24.04.2019  Stored Cross-site Scripting (XSS) vulnerability in 1MB.site

How I discovered a Stored XSS vulnerability in 1MB.site - Binit Ghimire

24.04.2019  I was able to Set the Date beyond the Possible Date on Facebook - Informative Issue

24.04.2019  How I was able to Discover a Stored Cross-site Scripting (XSS) vulnerability in Flaticon

How I was able to Discover a Stored Cross-site Scripting (XSS) vulnerability in Flaticon - Binit Ghimire

22.04.2019  How I was able to create Unauthorized Comments on Facebook Live Stream

Back in October, 2018, I discovered a vulnerability on Facebook that allowed me to create unauthorized comments on live streams of people who aren't my friends and don't allow non-friends to comment on their posts.

For this vulnerability, the Facebook Security Team rewarded me a bounty amount of $750, which was the first ever bounty that I ever received.


Reported Vulnerabilities

All Submissions VIP Submissions

Domain Reported Status Type
25.06.2020
On Hold
Cross Site Scripting
25.06.2020
On Hold
Cross Site Scripting
25.06.2020
On Hold
Cross Site Scripting
25.06.2020
On Hold
Cross Site Scripting
25.06.2020
On Hold
Cross Site Scripting
25.06.2020
On Hold
Cross Site Scripting
29.12.2019
patched
Cross Site Scripting
27.11.2019
unpatched
Cross Site Scripting
24.11.2019
unpatched
Improper Access Control 
21.11.2019
unpatched
Improper Access Control 
21.11.2019
unpatched
Improper Access Control 
21.11.2019
unpatched
Cross Site Scripting
21.11.2019
patched
Cross Site Scripting
20.11.2019
unpatched
Cross Site Scripting
20.11.2019
unpatched
Cross Site Scripting
20.11.2019
unpatched
Cross Site Scripting
19.11.2019
patched
Improper Access Control 
19.11.2019
patched
Cross Site Scripting
19.11.2019
patched
Cross Site Scripting
19.11.2019
unpatched
Cross Site Scripting

  Latest Patched

 10.07.2020 as-1.co.jp
 10.07.2020 scad.edu
 10.07.2020 nodis3.gsfc.nasa.gov
 09.07.2020 plagscan.com
 09.07.2020 gettyimages.fr
 09.07.2020 kiplinger.com
 09.07.2020 penzance-tc.gov.uk
 09.07.2020 eszkola.pl
 09.07.2020 rid.ncifcrf.gov
 09.07.2020 nu.or.id

  Latest Blog Posts

24.06.2020 by Gkexamquiz
How to Find Contacts To Report Bugs & Security Vulnerabilities | Bug Bounty Tutorials 2020
24.06.2020 by 0xcrypto
Improper Access Control - Generic: Unrestricted access to any "connected pack" on docs in coda.io
04.04.2020 by Rando02355205
(Alibaba) message.alibaba.com [IDOR] - [Bug Bounty]
12.03.2020 by Rando02355205
(Paypal) www.paypal.com [CSP High Level] - [XSS Reflected] - [Bug Bounty] - [Write Up]
08.03.2020 by CybeReports
JDECO.net XSS Vulnerability| CybeReports

  Recent Recommendations

    9 July, 2020
     newstroll_de:
Thanks for reporting the bug in a very professional manner. We appreciate your work that helps us making our service more secure.
    9 July, 2020
     MariStep2:
Great job! :) Thank you for searching for vulnerabilities on our site. Very responsive, attentive and responsible Security Researcher.
    8 July, 2020
     ziduniwien:
Dear Tanzil,

The University of Vienna would like to thank you for your valuable contribution in finding multiple website security issues.
Your input is highly welcome and helps to raise the security level of our educational institution.

Servus and greetings from Vienna, Austria.
    8 July, 2020
     baladulan:
Armin, vielen Dank für deine Unterstützung!
    6 July, 2020
     aldraHastur:
Vielen Dank für den Hinweis, mit dem wir eine Lücke im System schließen konnten.