Infosec Institute

Open Bug Bounty mentioned in the
Top 6 Bug Bounty programs of
2022 by the InfoSec Institute

The Hacker News

Open Bug Bounty named among the
Top 5 Bug Bounty programs of 2021
by The Hacker News

Platform update: please use our new authentication mechanism to securely use the Open Bug Bounty Platform.
For security researchers
Report a Vulnerability
Submit, help fixing, get kudos.
For website owners
Start a Bug Bounty
Run your bounty program for free.
1,707,697 coordinated disclosures
1,384,586 fixed vulnerabilities
1,997 bug bounty programs, 3,905 websites
47,393 researchers, 1,654 honor badges

fakessh | Security Researcher Profile


Security researcher fakessh has already helped fix 1839 vulnerabilities.



Researcher reputation:  830

Real name:
lacroute serge

About me:
Computer expert research https://hackerone.com/lacrouteserge/ #celibataire beaufrere #josh previous #crimee now #nenuphar nasa mes publications sont anonymes
aka sergi julien

Contact email:
by email
[email protected]
pgp
https://pastebin.com/raw/KqF20bC1

Alternative Contacts:
lacroute serge
4 bis avenue general de gaulle
64000 pau
france
33695635060

Certifications & Diplomas:
https://map.httpcs.com/author/26492
https://hackerone.com/lacrouteserge

Experience in Application Security
over 5 years

Award / Bug Bounty I prefer:
paypal [email protected]
bitcoin 1MM5j6t8WBaRTwus2tBJEvegU44LU8qYnq
ether 0x1212EE17169244fcCD244Be1c6f0C3cfCfaa1D75
payoneer [email protected]
wired transfer contact m
size XXL

Halls of Fame:
boschs webmini active-campaign ebay xmarks att wiki.scn.sap.com europa.eu simplerisk.com ziprecruteur buzzfeed meetic altervista nokia thumbtack.com pivotal.io dutchdare.nl zooniverse.org

Follow me on:
Twitter
Facebook
LinkedIn

Ethics and Rules:
lacroute serge is required to abide by the ethics and rules of the Open Bug Bounty project. If you reasonably believe that rules are not respected, please report this to us.

Recommendations and Acknowledgements | Full List:

@coliseum555     23 January, 2020
    Twitter coliseum555 Andrei from Geo-home:
Dear fakessh, thank you for responsible disclosure of a XSS vulnerability on a site.

Best regards,
Andrei
@sbcsirt     19 November, 2019
    Twitter sbcsirt SoftBank CSIRT from SoftBank Corp.:
Dear fakessh,

Thank you for discovering the vulnerability of our website.
We were able to immediately fix this vulnerability thanks to your report.
We appreciate your kindness.

Best regards,
SoftBank CSIRT
@Tin77594360     21 October, 2019
    Twitter Tin77594360 Tin from American Water:
On behalf of our company, thank you for the accurate and quick response in disclosing our vulnerability. This was done in a professional and responsible manner through the bug bounty program, giving us time to remediate.
@tomcorder     21 October, 2019
    Twitter tomcorder Tom Corder from Emmanuel College:
Thank you fakessh for not only finding and reporting a bug on our college website but then being very helpful in helping me to reproduce the issue and then verifying it as being solved. I am very grateful.
@CsirtOu     7 October, 2019
    Twitter CsirtOu Matej Zuzcak from CSIRT OU - University of Ostrava:
Thank you for responsible disclosure of a XSS vulnerability on our web site. Thanks also for fast and friendly communication.

Matej Zuzcak
Head of CSIRT OU
University of Ostrava
@ziduniwien     2 October, 2019
    Twitter ziduniwien Zentraler Informatikdienst from University of Vienna:
Dear fakessh,
The University of Vienna would like to thank you for your valuable contribution in finding multiple website security issues.
Your input is highly welcome and helps to raise the security level of our educational institution.
Servus and greetings from Vienna, Austria.
@UUCSIRT     20 September, 2019
    Twitter UUCSIRT Security and safety dept from Uppsala university:
Thank you for your vulnerability report!
/Hans Liss, Uppsala university
@CertUC3M     13 September, 2019
    Twitter CertUC3M CSIRT at UC3M from Universidad Carlos III of Madrid:
We would like to thank Fakessh for your carefull and professionally conducted vulnerability report.

Wishing you the best

Rafael Calzada
Security Manager
Universidad Carlos III of Madrid
[email protected]
@LancasterUniSOC     10 September, 2019
    Twitter LancasterUniSOC John Couzins from Lancaster University:
Dear fakessh,
Thank you very much for your responsible and professionally conducted vulnerability report.
@_isgi_     6 September, 2019
    Twitter _isgi_ ISGI from ISGI:
Dear Fakessh,

The International Service of Geomagnetic Indices would like to thank you for your nice and valuable contribution in finding website security issue. Your message helps us to raise the security level of our international scientific service.

Best regards from Strasbourg, France,
@Untanux     14 August, 2019
    Twitter Untanux Antanas from VDU:
Thank you for responsible disclosure of a XSS vulnerability on a site.

Best regards,
VDU IT team
Lithuania
@NewLineHorizon1     3 August, 2019
    Twitter NewLineHorizon1 Melisa from NewLineHorizon:
Dear,

Thanks for participating in responsible disclosure program.
The reports you submitted were extremely helpful to our team and provided us the details we needed to resolve the issues that you identified.
We are deeply committed to provide a safe and secure experience to our users and are therefore grateful for your efforts to help us improve our services.

Best Regards!
@rodrigobreness     26 July, 2019
    Twitter rodrigobreness Rodrigo Brenes from National Instruments:
Thank you for responsible disclosure. The report was to the point and actionable.
@rodrigobreness     26 July, 2019
    Twitter rodrigobreness Rodrigo Brenes from National Instruments:
Thank you for responsible disclosure of a vulnerability.
Very accurate and actionable notification.
Regards,
Rodrigo Brenes
Security Operations Lead
@MarioHarjac     1 July, 2019
    Twitter MarioHarjac Mario Harjač from Faculty of Organization and Informatics:
Thank you for responsible disclosure of XSS vulnerability at one of our sites.

Greetings from Varaždin, Croatia
@atluxity     13 June, 2019
    Twitter atluxity Hans-Petter Fjeld from Basefarm:
Dear fakessh,

Thank you for your notification about our exposed XSS. Your notification was brief and to the point, providing us with good information so we could confirm and reproduce the report.

Best regard
Hans-Petter Fjeld
Information Security Engineer

BASEFARM | Nydalen Allé 37a | 0484 Oslo | Norway
Phone: +47 4000 4100 | Mobile: +47 957 28 209
[email protected] | www.basefarm.com

technical excellence - caring for your business
@rc_zrc     23 May, 2019
    Twitter rc_zrc Computer Center from ZRC SAZU:
Thank you for your vulnerability report!
Computer center @ Scientific Research center of SAZU
Ljubljana, Slovenia
@William97920785     20 May, 2019
    Twitter William97920785 William CHAN from SFO:
Dear Fakessh,

Thank you for your findings. We have enhanced the XSS checking mechanism in the website based on your findings.
@wirismath     14 May, 2019
    Twitter wirismath Marketing & Communications from WIRIS MATH:
Hello, fakessh! We want to thank you for your vulnerabity report. With your information and collaboration, we could fix a security issue in one of our websites. Great job!
@ziduniwien     14 May, 2019
    Twitter ziduniwien Computer Center from University of Vienna:
Dear fakessh,

The University of Vienna would like to thank you for your valuable contribution in finding multiple website security issues. Your input is highly welcome and helps to raise the security level of our educational institution.

Servus and greetings from Vienna, Austria.
@CSIRTCV     9 May, 2019
    Twitter CSIRTCV Team from CSIRT-CV:
Thank you for disclosing the XSS on a site under our constituency and all the info provided, so we were able to replicate the problem and initiate the fix.
@patricksaladino     1 May, 2019
    Twitter patricksaladino Patrick Saladino from EPFL:
Dear Serge,

The EPFL would like to thank you for identifying and responsibly disclosing a vulnerability on one of our websites. Your responsiveness was also greatly appreciated.
@bmwghp     27 April, 2019
    Twitter bmwghp bmwghp from University of Tokyo:
Thanks for your report of a vulnerability on our site and quick response to our request of additional information. We were able to fix the problem very soon.
@Govcert_AT     12 April, 2019
    Twitter Govcert_AT GovCERT Austria :
Dear fakessh,

GovCERT Austria would like to thank you for responsibly disclosing web vulnerabilities under gv.at. The operators of the site from today's report also would like to thank you for the notification.

Greetings from Vienna, Austria
@mogiwitt     2 April, 2019
    Twitter mogiwitt Joe from cs.scranton.edu:
Thank you very much for identifying a vulnerability on our website! Our site is a little more secure thanks to you, and that's something my users and I appreciate.
@adricapi     2 April, 2019
    Twitter adricapi Adrià Sánchez from dEIC - UAB:
Thank you for identifying a vulnerability on one of our sites, we were able to solve it really quickly thanks to the information provided by the researcher.
@IT_Wolve     5 February, 2019
    Twitter IT_Wolve IT_Wolve from Pepperl+Fuchs GmbH:
Thanks for identifying a vulnerability on web site, we were able to improve our coding as a result.
@ziduniwien     22 October, 2018
    Twitter ziduniwien Computer Center from University of Vienna:
Dear fakessh,

The University of Vienna would like to thank you for your valuable contribution in finding multiple website security issues. Your input is highly welcome and helps to raise the security level of our educational institution.

Servus and greetings from Vienna, Austria.
@WebtekB     6 June, 2018
    Twitter WebtekB Gian Carlo Cervone from The College at Brockport:
Thanks for your help in identifying a vulnerability on our site and bringing it to our attention!
@HarperAdamsWeb     18 May, 2018
    Twitter HarperAdamsWeb James from Harper Adams University:
Thanks for reporting the issue with one of our pages. Your quick response helped us quickly identify and fix the vulnerability.
@Rico7Suave     7 May, 2018
    Twitter Rico7Suave Rico from SDSU:
Very responsive, found XSS that automated tool failed to find.
@DrehscheibeO     5 May, 2018
    Twitter DrehscheibeO Michael Ulbricht from ArGe DREHSCHEIBE e.V.:
Many thanks for a nice and useful example of XSS in our page, fixed very soon!
@janampeeters     19 April, 2018
    Twitter janampeeters Jan Peeters from RKDocumenten:
Thanks, Fakessh, for reporting the vulnerability on our website. Thanks to your additional information, we were able to quickly fix the problem.
@ziduniwien     3 April, 2018
    Twitter ziduniwien Computer Center from University of Vienna:
Dear fakessh,

The University of Vienna would like to thank you for your valuable contribution in finding a website security issue.

Your input is highly welcome and helps to raise the security level of our educational institution.

Servus and greetings from Vienna, Austria.
@woolorama     22 March, 2018
    Twitter woolorama Kristen Fragar from Random Grafix:
Thanks for identifying a vulnerability on one of our sites, we were able to improve our coding practices as a result.
@vidyaishaya     19 March, 2018
    Twitter vidyaishaya Vidya from OpEdNews.Com:
Yessir! That was a real vulnerability. Thanks for spotting it. And now I can look for more like it.
@Jacob_Venable     16 March, 2018
    Twitter Jacob_Venable Jacob V. from Purdue University:
The vulnerability you notified our team about also helped identify similar ones across our site. Thank you for bringing this to light and providing a clear proof-of-concept.
@mapc0000     14 February, 2018
    Twitter mapc0000 mapc0000 from Infozentrum:
Thank you for notifying us about this vulnerability and for the quick help with details on how to reproduce it. It has been fixed now!
@UKClimbing     10 February, 2018
    Twitter UKClimbing Paul Phillips from UKClimbing:
Thanks for the alert and fast communications.
@C18AH     9 February, 2018
    Twitter C18AH Alexander from TGA:
Thanks for reporting the XSS vulnerability on our site and the quick response with details of how to reproduce.
@democity     8 February, 2018
    Twitter democity Terry from E-Gov Link:
Thanks for your assistance with an issue on our site.
@sbbeachvball     29 January, 2018
    Twitter sbbeachvball Aaron from UCSB:
Thanks for finding and reporting this issue. I had to ask for more specifics about the URL and the researcher responded incredibly quickly. The problem was with somebody elses old php code dating back to the 2000's. They were not sanitizing input at ALL ... YIKES!!! Thanks again! Am looking into having our department provide a small donation.
@xnview     7 January, 2018
    Twitter xnview Gougelet from XnView:
Thanks for finding the issue on my website.
@TMotobayashi     25 December, 2017
    Twitter TMotobayashi Takaaki from Japan:
Thanks for sharing this issue, all fixed.

It was a file not already in use. I solved it by deleting it.
Thank you very much.
@etlund     13 December, 2017
    Twitter etlund Eric from CoolWorks:
Thanks for reporting the XSS vulnerability on our site and the quick response with details of how to reproduce.
@senegal24h     10 December, 2017
    Twitter senegal24h Laye from n/a:
Thanks for sharing this issue and clear demonstration of the exploit.
@meorhizmin     5 December, 2017
    Twitter meorhizmin Meor H. from Webway:
Thank you for letting us know about the potential XSS risk on our website. Our IT team is working on making the website more secure now, thanks to you!
@TiggysPlace_com     24 November, 2017
    Twitter TiggysPlace_com Dave from TiggysPlace:
Thankyou for bringing my attention to our bug, i have fixed it now, i hope others find your skills as useful!
@garethrg9     24 November, 2017
    Twitter garethrg9 Gareth from n/a:
Many thanks for the alert and for the very prompt response. Hopefully now all fixed.
@info_ebe     22 November, 2017
    Twitter info_ebe Henry from ebe_info:
Thank you for finding this bug I appreciate your work
@satcharts     19 November, 2017
    Twitter satcharts Paul from satcharts:
Thank you for finding security issue on my website. I appreciate your work!
@UKClimbing     15 November, 2017
    Twitter UKClimbing Paul Phillips from UKClimbing:
Thanks for sharing this issue, all fixed.
@SNTech2     10 November, 2017
    Twitter SNTech2 Steve from SN-CPT:
Thanks for bringing this issue to our attention, highly appreciated !
@AdamHessDev     6 November, 2017
    Twitter AdamHessDev Adam Hess from Brooklyn Law School:
Serge,
Thank you for helping us finding vulnerabilities in our website. I appreciated your responsiveness and clear demonstration of the exploit.
@lancsuniweb     6 November, 2017
    Twitter lancsuniweb Lancaster University Web Team from Lancaster University:
Thank you for bringing this to our attention and helping us improve the quality of our site.
@thepsycoder     30 October, 2017
    Twitter thepsycoder Paul from University Sector:
Thanks so much for highlighting a long standing XSS bug on our site.
@mediawardotcom     18 October, 2017
    Twitter mediawardotcom Thomas from CRI:
Thanks very much for your good work! highly appreciated
@roddyr2     11 April, 2017
    Twitter roddyr2 Roddy from RefreshThing.com:
Thanks for bringing this issue to our attention and helping us fix it!

Best,

Roddy
@saintdevilx     4 April, 2017
    Twitter saintdevilx Deepak from droofle:
Hi fakessh,

Thank you for your help.
Really appreciate your effort to fix that issue.

Thanks and Regards
Deepak
@zid_tuwien     29 March, 2017
    Twitter zid_tuwien Philipp from ZID/TU Wien:
Hi,

thanks for pointing that out.

It's part of an application, that is beeing phased out. It is fixed now.

Regards,
Philipp

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Secured Websites Badge
50+ Secured Websites Badge
500+ Secured Websites Badge
Web Security Veteran Badge
10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser Badge
CSRF Master Badge
AppSec Logic Master Badge
Fastest Fix Badge
WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB Badge
OBB Advocate Badge
Improved OBB Badge
Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master Badge
Patch Guru Badge
Patch Lord Badge
Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE Badge
FAMOUS Badge
GLOBALLY TRUSTED Badge
REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

Distinguished Blog Author Badge
Distinguished Blog Author Badge
Distinguished Blog Author Badge
1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:5148
Total reports on VIP sites:283
Total patched vulnerabilities:1839
Recommendations received:60
Active since:14.02.2017

Open Bug Bounty Certificate


Researcher Certificate

Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions


27.05.2019  bing openredirect

bing openredirect

20.05.2019  Hitachi Incident Response Team (HIRT)

Hitachi HIRT xss reflected

  Latest Patched

 07.05.2024 governor.pa.gov
 07.05.2024 vis.globe.gov
 06.05.2024 dbtbharat.gov.in
 02.05.2024 iuclid6.echa.europa.eu
 02.05.2024 capim.pb.gov.br
 01.05.2024 siat-sz.edu.cn

  Latest Blog Posts

04.12.2023 by BAx99x
Unmasking the Power of Cross-Site Scripting (XSS): Types, Exploitation, Detection, and Tools
04.12.2023 by a13h1_
$1120: ATO Bug in Twitter’s
04.12.2023 by ClumsyLulz
How I found a Zero Day in W3 Schools
04.12.2023 by 24bkdoor
Hack the Web like a Pirate: Identifying Vulnerabilities with Style
04.12.2023 by 24bkdoor
Navigating the Bounty Seas with Open Bug Bounty

  Recent Recommendations

    1 May, 2024
    Mek:
Got a recommendation to fix an SQL injection vulnerability on my website. As I am a hobbyist and my page is a hobby project, I can't offer money, so I am recommending this researcher. Thanks again.
    26 April, 2024
    I_bims_Mike:
Thank you very much for identifying the XSS vulnerability and for our friendly email exchange.
    22 April, 2024
    genoverband:
Thank you for your invaluable help in ensuring the security of our domain and its visitors!
    10 April, 2024
    Mars:
Hatim uncovered a XSS bug that we were able to quickly resolve. Thanks very much for your assistance and help.
    8 April, 2024
    Panthermedia:
Thanks to the support of Hatim Chabik, we were able to identify and solve an XSS bug.