Coordinated and Responsible Vulnerability Disclosure Free Bug Bounty Program 329,053 coordinated disclosures
190,863 fixed vulnerabilities
408 bug bounties with 864 websites
9,217 researchers, 854 honor badges

fakessh | Security Researcher Profile


Security researcher fakessh has already helped fix 1484 vulnerabilities.



Researcher reputation:  400

Real name:
lacroute serge

About me:
Computer expert research https://hackerone.com/lacrouteserge/ #celibataire beaufrere #josh previous #crimee nasa mes publications sont anonymes
aka sergi julien

How to contact me:
by email
[email protected]
gpg --keyserver pgp.mit.edu --recv 877E543C2528900A
gpg --keyserver pool.sks-keyservers.net --recv 877E543C2528900A

Alternative Contacts:
[email protected]
gpg --keyserver pgp.mit.edu --recv 877E543C2528900A
gpg --keyserver pool.sks-keyservers.net --recv 877E543C2528900A

Certifications & Diplomas:
https://map.httpcs.com/author/26492
https://hackerone.com/lacrouteserge

Experience in Application Security
over 5 years

Award / Bug Bounty I prefer:
All work deserves a salary to your good heart
paypal email [email protected]
bitcoin 1MM5j6t8WBaRTwus2tBJEvegU44LU8qYnq
ether 0x1212EE17169244fcCD244Be1c6f0C3cfCfaa1D75

Halls of Fame:
boschs webmini active-campaign ebay xmarks att wiki.scn.sap.com europa.eu simplerisk.com ziprecruteur buzzfeed meetic altervista nokia thumbtack.com pivotal.io dutchdare.nl zooniverse.org

Follow me on:
Twitter
Facebook

Recommendations and Acknowledgements | Full List:

    5 February, 2019
     IT_Wolve IT_Wolve from Pepperl+Fuchs GmbH:
Thanks for identifying a vulnerability on web site, we were able to improve our coding as a result.
    22 October, 2018
     ziduniwien Computer Center from University of Vienna:
Dear fakessh,

The University of Vienna would like to thank you for your valuable contribution in finding multiple website security issues. Your input is highly welcome and helps to raise the security level of our educational institution.

Servus and greetings from Vienna, Austria.
    6 June, 2018
     WebtekB Gian Carlo Cervone from The College at Brockport:
Thanks for your help in identifying a vulnerability on our site and bringing it to our attention!
    18 May, 2018
     HarperAdamsWeb James from Harper Adams University:
Thanks for reporting the issue with one of our pages. Your quick response helped us quickly identify and fix the vulnerability.
    7 May, 2018
     Rico7Suave Rico from SDSU:
Very responsive, found XSS that automated tool failed to find.
    5 May, 2018
     DrehscheibeO Michael Ulbricht from ArGe DREHSCHEIBE e.V.:
Many thanks for a nice and useful example of XSS in our page, fixed very soon!
    19 April, 2018
     janampeeters Jan Peeters from RKDocumenten:
Thanks, Fakessh, for reporting the vulnerability on our website. Thanks to your additional information, we were able to quickly fix the problem.
    3 April, 2018
     ziduniwien Computer Center from University of Vienna:
Dear fakessh,

The University of Vienna would like to thank you for your valuable contribution in finding a website security issue.

Your input is highly welcome and helps to raise the security level of our educational institution.

Servus and greetings from Vienna, Austria.
    22 March, 2018
     woolorama Kristen Fragar from Random Grafix:
Thanks for identifying a vulnerability on one of our sites, we were able to improve our coding practices as a result.
    19 March, 2018
     vidyaishaya Vidya from OpEdNews.Com:
Yessir! That was a real vulnerability. Thanks for spotting it. And now I can look for more like it.
    16 March, 2018
     Jacob_Venable Jacob V. from Purdue University:
The vulnerability you notified our team about also helped identify similar ones across our site. Thank you for bringing this to light and providing a clear proof-of-concept.
    14 February, 2018
     mapc0000 mapc0000 from Infozentrum:
Thank you for notifying us about this vulnerability and for the quick help with details on how to reproduce it. It has been fixed now!
    10 February, 2018
     UKClimbing Paul Phillips from UKClimbing:
Thanks for the alert and fast communications.
    9 February, 2018
     C18AH Alexander from TGA:
Thanks for reporting the XSS vulnerability on our site and the quick response with details of how to reproduce.
    8 February, 2018
     democity Terry from E-Gov Link:
Thanks for your assistance with an issue on our site.
    29 January, 2018
     sbbeachvball Aaron from UCSB:
Thanks for finding and reporting this issue. I had to ask for more specifics about the URL and the researcher responded incredibly quickly. The problem was with somebody elses old php code dating back to the 2000's. They were not sanitizing input at ALL ... YIKES!!! Thanks again! Am looking into having our department provide a small donation.
    7 January, 2018
     xnview Gougelet from XnView:
Thanks for finding the issue on my website.
    25 December, 2017
     TMotobayashi Takaaki from Japan:
Thanks for sharing this issue, all fixed.

It was a file not already in use. I solved it by deleting it.
Thank you very much.
    13 December, 2017
     etlund Eric from CoolWorks:
Thanks for reporting the XSS vulnerability on our site and the quick response with details of how to reproduce.
    10 December, 2017
     senegal24h Laye from n/a:
Thanks for sharing this issue and clear demonstration of the exploit.
    5 December, 2017
     meorhizmin Meor H. from Webway:
Thank you for letting us know about the potential XSS risk on our website. Our IT team is working on making the website more secure now, thanks to you!
    24 November, 2017
     TiggysPlace_com Dave from TiggysPlace:
Thankyou for bringing my attention to our bug, i have fixed it now, i hope others find your skills as useful!
    24 November, 2017
     garethrg9 Gareth from n/a:
Many thanks for the alert and for the very prompt response. Hopefully now all fixed.
    22 November, 2017
     info_ebe Henry from ebe_info:
Thank you for finding this bug I appreciate your work
    19 November, 2017
     satcharts Paul from satcharts:
Thank you for finding security issue on my website. I appreciate your work!
    15 November, 2017
     UKClimbing Paul Phillips from UKClimbing:
Thanks for sharing this issue, all fixed.
    10 November, 2017
     SNTech2 Steve from SN-CPT:
Thanks for bringing this issue to our attention, highly appreciated !
    6 November, 2017
     AdamHessDev Adam Hess from Brooklyn Law School:
Serge,

Thank you for helping us finding vulnerabilities in our website. I appreciated your responsiveness and clear demonstration of the exploit.

Regards

Adam Hess
    6 November, 2017
     lancsuniweb Lancaster University Web Team from Lancaster University:
Thank you for bringing this to our attention and helping us improve the quality of our site.
    30 October, 2017
     thepsycoder Paul from University Sector:
Thanks so much for highlighting a long standing XSS bug on our site.
    18 October, 2017
     mediawardotcom Thomas from CRI:
Thanks very much for your good work! highly appreciated
    11 April, 2017
     roddyr2 Roddy from RefreshThing.com:
Thanks for bringing this issue to our attention and helping us fix it!

Best,

Roddy
    4 April, 2017
     saintdevilx Deepak from droofle:
Hi fakessh,

Thank you for your help.
Really appreciate your effort to fix that issue.

Thanks and Regards
Deepak
    29 March, 2017
     zid_tuwien Philipp from ZID/TU Wien:
Hi,

thanks for pointing that out.

It's part of an application, that is beeing phased out. It is fixed now.

Regards,
Philipp

Please login via Twitter to add a recommendation

Awards and Achievements


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:4182
Total reports on VIP sites:154
Total patched vulnerabilities:1484
Total vulnerabilities on Hold (Open Bug Bounty):133
Recommendations received:34
Active since:14.02.2017

Open Bug Bounty Certificate





No posts in blog yet


Reported Vulnerabilities

All Submissions VIP Submissions

Domain Reported Status Type
24.03.2019
On Hold
Cross Site Scripting
24.03.2019
On Hold
Cross Site Scripting
24.03.2019
On Hold
Cross Site Scripting
24.03.2019
On Hold
Cross Site Scripting
24.03.2019
On Hold
Cross Site Scripting
24.03.2019
On Hold
Cross Site Scripting
24.03.2019
On Hold
Cross Site Scripting
24.03.2019
On Hold
Cross Site Scripting
24.03.2019
On Hold
Cross Site Scripting
23.03.2019
On Hold
Cross Site Scripting
23.03.2019
On Hold
Cross Site Scripting
23.03.2019
On Hold
Cross Site Scripting
23.03.2019
On Hold
Cross Site Scripting
23.03.2019
On Hold
Cross Site Scripting
23.03.2019
On Hold
Cross Site Scripting
23.03.2019
On Hold
Cross Site Scripting
23.03.2019
On Hold
Cross Site Scripting
22.03.2019
On Hold
Cross Site Scripting
22.03.2019
On Hold
Cross Site Scripting
22.03.2019
On Hold
Cross Site Scripting

  Latest Patched

 24.03.2019 datpiff.com
 24.03.2019 gruppocarige.it
 24.03.2019 javhd.pro
 24.03.2019 flirt4free.com
 23.03.2019 redcross.org
 23.03.2019 etsu.edu
 23.03.2019 dump.xxx
 23.03.2019 vipon.com
 23.03.2019 jeuxjeuxjeux.fr

  Latest Blog Posts

22.03.2019 by HackerGautam
TLS 1.3 Genesis, Mechanism and Working
19.03.2019 by Open Bug Bounty
GDPR PII exposure can now be securely reported via Open Bug Bounty
24.02.2019 by ismailtsdln
Apple XSS Vulnerability - Proof of Concept (PoC)
24.02.2019 by ismailtsdln
How do you use an xss as a keylogger ?
23.02.2019 by ismailtsdln
Everything about XSS is in this source!

  Recent Recommendations

    24 March, 2019
     granthughes17:
Thank you for reporting this vulnerability to us responsibly and for your professional conduct. Your assistance and professionalism is much appreciated.
    22 March, 2019
     jcfmachado:
Thank you for your time and notification.
    19 March, 2019
     rogerdc01:
Ezio has helped me with a vulnerability. Answered very fast after some questions and showed the way to examine the issue. Very professional!
    19 March, 2019
     interactmultim1:
Thank you k0t for reporting this bug. We appreciate your work!
    19 March, 2019
     CoreInstance:
Armin, vielen Dank für deine professionelle Unterstützung! Dank deiner Hilfe, konnten wir die Schwachstelle bei unserem Kunden direkt beheben.