Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
494,259 coordinated disclosures
269,463 fixed vulnerabilities
666 bug bounties with 1,346 websites
13,738 researchers, 1038 honor badges

ibrahimd | Security Researcher Profile


Security researcher ibrahimd has already helped fix 192 vulnerabilities.



Researcher reputation:  10

Real name:
Taha Ibrahim DRAIDIA

About me:
Security Researcher & Bug Bounty Hunter. Having a background as a developer helps me see inside the apps during testing and explain problems to the dev team afterwards.

How to contact me:
Feel free to get in touch with me on:

Email: [email protected]
Twitter: @ibrahimdraidia

Experience in Application Security
1-3 years

Award / Bug Bounty I prefer:
An acknowledgment on my profile is enough but if you feel like to thank me with something extra for my time I appreciate the following:
- Bug Bounty: Paypal
- Swag: T-shirt
- Public Recogniting

Halls of Fame:
Google - Microsot - Hostinger - Opentext - Eset Antivirus ...

Follow me on:
Twitter
LinkedIn

Recommendations and Acknowledgements

    11 October, 2017
     ruk Peter Rukavina from Reinvented Inc.:
Helpful identification of an XSS issue, quick communication. Thank you.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:446
Total reports on VIP sites:31
Total patched vulnerabilities:192
Recommendations received:1
Active since:18.08.2017

Open Bug Bounty Certificate





No posts in blog yet


Reported Vulnerabilities

All Submissions VIP Submissions

Domain Reported Status Type
16.07.2018
unpatched
Cross Site Scripting
13.07.2018
unpatched
Cross Site Scripting
26.06.2018
unpatched
Cross Site Scripting
22.06.2018
unpatched
Cross Site Scripting
31.05.2018
patched
Cross Site Scripting
17.04.2018
patched
Cross Site Scripting
27.03.2018
unpatched
Cross Site Scripting
10.01.2018
patched
Cross Site Scripting
25.11.2017
unpatched
Cross Site Scripting
15.11.2017
unpatched
Cross Site Scripting
15.11.2017
unpatched
Cross Site Scripting
15.11.2017
patched
Cross Site Scripting
15.11.2017
patched
Cross Site Scripting
11.11.2017
patched
Cross Site Scripting
11.11.2017
unpatched
Cross Site Scripting
11.11.2017
patched
Cross Site Scripting
11.11.2017
unpatched
Cross Site Scripting
08.11.2017
patched
Cross Site Scripting
07.11.2017
unpatched
Cross Site Scripting
07.11.2017
patched
Cross Site Scripting

  Latest Patched

 26.01.2020 mail-archive.com
 26.01.2020 biphim.tv
 26.01.2020 price.to
 26.01.2020 sparkfun.com
 26.01.2020 donaldson.com
 26.01.2020 tv.camcom.gov.it
 25.01.2020 tengrinews.kz
 25.01.2020 au.ru
 25.01.2020 clarkdale.az.gov

  Latest Blog Posts

20.01.2020 by Rando02355205
XSS on "www.alibaba.com" (Alibaba WAF 405) Bypassed.
16.01.2020 by Open Bug Bounty
Brief Recap of Open Bug Bounty’s Record Growth in 2019
12.01.2020 by JCQ_47
WAF Cloudflare Bypass XSS at Nexusmods.com
08.01.2020 by devl00p
Top 100 Open Redirect dorks
08.01.2020 by Rando02355205
XSS WAF Bypassed

  Recent Recommendations

    24 January, 2020
     ryne70030772:
Thanks Again.
    24 January, 2020
     ryne70030772:
Thanks for the XSS report. We have patched the issue. Thank a lot for alerting us.
    24 January, 2020
     ryne70030772:
Thanks for reporting issue on our Website. Vulnerability has been patched
    23 January, 2020
     harryoosterveen:
MAS00712 found xss vulnerability on our website. We have fixed the issue. Thank you for your report!
    23 January, 2020
     SandiSchleicher:
Thank you for reporting the XSS issue you found. Based on your information we were able to fix the problem. Thank you!