Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
612,230 coordinated disclosures
393,304 fixed vulnerabilities
928 bug bounties with 1,868 websites
18,812 researchers, 1199 honor badges

raviakp1004 | Security Researcher Profile


Security researcher raviakp1004 has already helped fix 1230 vulnerabilities.



Researcher reputation:  90

Real name:
Ravi Ashok Prajapati

About me:
RAVI PRAJAPATI
Certified Penetration Testing Engineer
mile2 cyber Security
Lic no. 1741300
LinkedIn : https://www.linkedin.com/in/ravi-prajapati-346b15190
Twitter : https://twitter.com/raviakp1004

How to contact me:
Email address : [email protected]
LinkedIn : https://www.linkedin.com/in/ravi-prajapati-346b15190
Twitter : https://twitter.com/raviakp1004

Alternative Contacts:
Email address : [email protected]
https://www.linkedin.com/in/ravi-prajapati-346b15190

Certifications & Diplomas:
Certified Penetration Testing Engineer

Experience in Application Security
1-3 years

Award / Bug Bounty I prefer:
Paypal: https://paypal.me/raviakp1004locale.xen_GB
# Bug Bounty ($$$)
# Hall Of Fame
# T-shirts, Sweats, Caps, Stickers, Keychains, gift ,etc

Halls of Fame:
lastpass.com (182)
https://bugcrowd.com/lastpass/hall-of-fame

Follow me on:
Twitter
LinkedIn

Recommendations and Acknowledgements

@RedLeoteca     27 July, 2020
    Twitter RedLeoteca Admin from Leoteca en Red:
Thank you very much for your support and efforts to help is. Highly appreciated.
@williambarnwell     25 June, 2020
    Twitter williambarnwell Bill Barnwell from Loyalist College:
Thanks for helping us with our XSS issue.
@CvlOperations     30 January, 2020
    Twitter CvlOperations Sean Purdy from CV-Library Ltd:
Thanks for your report.
@DougMT1     23 March, 2020
    Twitter DougMT1 Doug Henderson from Media Temple:
Thanks very much for taking the time to report a problem.
@sust_it     4 March, 2020
    Twitter sust_it Admin from Sust-it:
Thanks for the report.
@fetchinfo     21 February, 2020
    Twitter fetchinfo CERTNRW from IT.NRW:
Thank you for the information

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Secured Websites Badge
50+ Secured Websites Badge
500+ Secured Websites Badge
Web Security Veteran Badge
10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser Badge
CSRF Master Badge
AppSec Logic Master Badge
Fastest Fix Badge
WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB Badge
OBB Advocate Badge
Improved OBB Badge
Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master Badge
Patch Guru Badge
Patch Lord Badge
Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE Badge
FAMOUS Badge
GLOBALLY TRUSTED Badge
REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

Distinguished Blog Author Badge
Distinguished Blog Author Badge
Distinguished Blog Author Badge
1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:4314
Total reports on VIP sites:384
Total patched vulnerabilities:1230
Total vulnerabilities on Hold (Open Bug Bounty):1287
Recommendations received:6
Active since:25.09.2019
Top VIP Security Researcher Awards: Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week

Open Bug Bounty Certificate


Researcher Certificate



No posts in blog yet


Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
29.10.2020
On Hold
Cross Site Scripting
29.10.2020
On Hold
Cross Site Scripting
29.10.2020
On Hold
Cross Site Scripting
29.10.2020
On Hold
Cross Site Scripting
29.10.2020
On Hold
Cross Site Scripting
29.10.2020
On Hold
Cross Site Scripting
29.10.2020
On Hold
Cross Site Scripting
29.10.2020
On Hold
Cross Site Scripting
29.10.2020
On Hold
Cross Site Scripting
29.10.2020
On Hold
Cross Site Scripting
29.10.2020
On Hold
Cross Site Scripting
29.10.2020
On Hold
Cross Site Scripting
29.10.2020
On Hold
Cross Site Scripting
29.10.2020
On Hold
Cross Site Scripting
29.10.2020
On Hold
Cross Site Scripting
29.10.2020
On Hold
Cross Site Scripting
29.10.2020
On Hold
Cross Site Scripting
29.10.2020
On Hold
Cross Site Scripting
29.10.2020
On Hold
Cross Site Scripting
28.10.2020
On Hold
Cross Site Scripting

  Latest Patched

 30.10.2020 t3n.de
 30.10.2020 489pro.com
 30.10.2020 dgtle.com
 29.10.2020 photobucket.com
 29.10.2020 istockphoto.com
 29.10.2020 skin.gs
 28.10.2020 plos.org
 28.10.2020 audiusa.com
 28.10.2020 um.es
 28.10.2020 bpjs-kesehatan.go.id

  Latest Blog Posts

26.10.2020 by _r00t1ng_
Bypass Addslashes using Multibyte Character
26.10.2020 by _r00t1ng_
One Payload to Inject them all - MultiQuery Injection
26.10.2020 by _r00t1ng_
Routed SQL Injection
26.10.2020 by _r00t1ng_
DIOS the SQL Injectors Weapon
26.10.2020 by p4c3n0g3
How to find AngularJS XSS

  Recent Recommendations

@MizoueShumpei     29 October, 2020
    Twitter MizoueShumpei:
Thank you very much for your help.
@adridder     28 October, 2020
    Twitter adridder:
Thank you for your help with this XSS vulnerability on our site. We appreciate the responsible reporting via openbugbounty.
@gaborvitez     28 October, 2020
    Twitter gaborvitez:
Ajaysen R found a reflected cross site scripting bug in one of our cgi scripts, this way he helped us improve the security of our website. He was really fast to react, working with him was really a pleasure. We are grateful for the issues he made us aware of.
@Jobe1986     28 October, 2020
    Twitter Jobe1986:
Thank you for your efforts and reporting the XSS vulnerability you found on my website.
@TConfetti     28 October, 2020
    Twitter TConfetti:
Vighnesh Gupta was responsive and professional in helping us remediate a bug on our website. Thank you for your insight, Vighnesh.