Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
532,741 coordinated disclosures
333,270 fixed vulnerabilities
784 bug bounties with 1,550 websites
15,896 researchers, 1098 honor badges

rahulvi93723664 | Security Researcher Profile


Security researcher rahulvi93723664 has already helped fix 20 vulnerabilities.



Researcher reputation:  0

Real name:
rahul vishwakarma

About me:
i need hard work

How to contact me:
hey this my real name rahul vishwakarma and i am belong to india in mumbai

i am staying in appapada kurar village malad east mumbai 400097 and mu contact number8108138710 my education is tybsc(cs

Alternative Contacts:
my contact number is 8108138710 and my facebook id is rahul vishwakarma i am from india in mumbai 02

Certifications & Diplomas:
i was completed tybsc(cs) and i have ethical hacking certificate i am learning more hacking that'set

Award / Bug Bounty I prefer:
i dont have experince

Halls of Fame:
nothing

Recommendations and Acknowledgements

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:257
Total reports on VIP sites:12
Total patched vulnerabilities:20
Total vulnerabilities on Hold (Open Bug Bounty):172
Active since:03.01.2020



No posts in blog yet


Reported Vulnerabilities

All Submissions VIP Submissions

Domain Reported Status Type
25.05.2020
On Hold
Cross Site Scripting
25.05.2020
On Hold
Cross Site Scripting
23.05.2020
On Hold
Cross Site Scripting
16.05.2020
On Hold
Cross Site Scripting
16.05.2020
On Hold
Cross Site Scripting
14.05.2020
On Hold
Cross Site Scripting
14.05.2020
On Hold
Cross Site Scripting
14.05.2020
On Hold
Cross Site Scripting
14.05.2020
On Hold
Cross Site Scripting
12.05.2020
On Hold
Cross Site Scripting
12.05.2020
On Hold
Cross Site Scripting
11.05.2020
On Hold
Cross Site Scripting
11.05.2020
On Hold
Cross Site Scripting
11.05.2020
On Hold
Cross Site Scripting
11.05.2020
On Hold
Cross Site Scripting
07.05.2020
On Hold
Cross Site Scripting
07.05.2020
On Hold
Cross Site Scripting
07.05.2020
On Hold
Cross Site Scripting
07.05.2020
On Hold
Cross Site Scripting
02.05.2020
On Hold
Cross Site Scripting

  Latest Patched

 26.05.2020 plantronics.com
 26.05.2020 benditofutbol.com
 25.05.2020 alaneesqatar.qa
 25.05.2020 shorturl.at
 25.05.2020 torrentoon.com
 25.05.2020 www1.eeoc.gov
 25.05.2020 fcrs.treas.gov
 25.05.2020 bankiros.ru
 25.05.2020 eichberg.ws
 25.05.2020 dhs.mn.gov

  Latest Blog Posts

04.04.2020 by Rando02355205
(Alibaba) message.alibaba.com [IDOR] - [Bug Bounty]
12.03.2020 by Rando02355205
(Paypal) www.paypal.com [CSP High Level] - [XSS Reflected] - [Bug Bounty] - [Write Up]
08.03.2020 by CybeReports
JDECO.net XSS Vulnerability| CybeReports
29.02.2020 by Rando02355205
(Google) groups.google.com - [Stored XSS] - [Bug Bounty] - [WriteUp] - [24/02/2020]
10.02.2020 by 0xrocky
Stored XSS on h2biz.net

  Recent Recommendations

    26 May, 2020
     chrisjimallen:
Very helpful insights, spotted something I'd overlooked.
    25 May, 2020
     thisismeraul:
Thanks for finding this vulnerability for us. The corporate website is more secure now. Good job!
    25 May, 2020
     VICTOR__Europe:
Thank you for helping us to fix the critical SQL injection.
Friendly contact, thanks for the effort.
    25 May, 2020
     vovsoft:
Thank you very much for finding the bug on our website and your responsible disclosure. Absolutely appreciated. You make the web a better place!
    25 May, 2020
     JoseAnt29908185:
We are very grateful to Broly157 for his help. He found on our website a security vulnerability related to cross site scripting , so we contacted him and in a very short he gave us a more detailed report and some very useful guidelines to solve the problem.