Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
541,636 coordinated disclosures
348,247 fixed vulnerabilities
816 bug bounties with 1,594 websites
16,693 researchers, 1133 honor badges

meltdown | Security Researcher Profile


Security researcher meltdown has already helped fix 7 vulnerabilities.



Researcher reputation:  20

Real name:
Alejandro Ramírez

How to contact me:
email: [email protected]
twitter: @alexro2404

Alternative Contacts:
email: [email protected]

Certifications & Diplomas:
IBM-TK301 - IBM AppScan Enterprise Foundations

Qualys Guard Cetified Specialest

Experience in Application Security
3-5 years

Award / Bug Bounty I prefer:
Hall of Fame
T-Shirt
Paypal paypal.me/mletdown
Amazon gift card
BTC
Swag
Gifs
thanks :)

Follow me on:
Twitter
Facebook
LinkedIn

Recommendations and Acknowledgements

    26 September, 2018
     Paruzzi_webm Pim from Paruzzi:
He pointed out a problem with a piece of iframe-related code (it was in an old page, that somehow was not deleted from our server). We could quickly fix the problem.
Thanks for your help.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:36
Total reports on VIP sites:3
Total patched vulnerabilities:7
Recommendations received:1
Active since:25.09.2018



No posts in blog yet


Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
12.03.2020
unpatched
Cross Site Scripting
10.03.2020
unpatched
Cross Site Scripting
06.03.2020
unpatched
Cross Site Scripting
05.03.2020
unpatched
Cross Site Scripting
25.02.2020
unpatched
Cross Site Scripting
19.02.2020
unpatched
Cross Site Scripting
17.02.2020
unpatched
Cross Site Scripting
13.01.2020
unpatched
Cross Site Scripting
26.11.2019
unpatched
Cross Site Scripting
20.11.2019
unpatched
Cross Site Scripting
19.11.2019
unpatched
Cross Site Scripting
12.11.2019
unpatched
Cross Site Scripting
11.11.2019
unpatched
Cross Site Scripting
06.11.2019
unpatched
Cross Site Scripting
09.10.2019
unpatched
Cross Site Scripting
07.10.2019
unpatched
Cross Site Scripting
09.09.2019
unpatched
Cross Site Scripting
06.09.2019
patched
Cross Site Scripting
05.09.2019
unpatched
Cross Site Scripting
04.09.2019
unpatched
Cross Site Scripting

  Latest Patched

 09.07.2020 axfc.net
 08.07.2020 arise.com
 08.07.2020 bloter.net
 08.07.2020 adzuna.com.au
 08.07.2020 tuniscope.com
 08.07.2020 jimms.fi
 08.07.2020 daniweb.com
 07.07.2020 wikizero.com
 07.07.2020 thimpress.com
 07.07.2020 kayqer.am

  Latest Blog Posts

24.06.2020 by Gkexamquiz
How to Find Contacts To Report Bugs & Security Vulnerabilities | Bug Bounty Tutorials 2020
24.06.2020 by 0xcrypto
Improper Access Control - Generic: Unrestricted access to any "connected pack" on docs in coda.io
04.04.2020 by Rando02355205
(Alibaba) message.alibaba.com [IDOR] - [Bug Bounty]
12.03.2020 by Rando02355205
(Paypal) www.paypal.com [CSP High Level] - [XSS Reflected] - [Bug Bounty] - [Write Up]
08.03.2020 by CybeReports
JDECO.net XSS Vulnerability| CybeReports

  Recent Recommendations

    8 July, 2020
     baladulan:
Armin, vielen Dank für deine Unterstützung!
    6 July, 2020
     aldraHastur:
Vielen Dank für den Hinweis, mit dem wir eine Lücke im System schließen konnten.
    4 July, 2020
     TadeuszWiew:
Thank you for finding and reporting the vulnerability on our website.
Great job! :)
    2 July, 2020
     booksprice:
Thank you for reporting the bug, and the clear details, much appreciated.
    1 July, 2020
     matthews8000:
Manish has correctly identified a vulnerability and suggested an appropriate fix. This has lead to an improvement in the security of the website.