Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
606,629 coordinated disclosures
390,202 fixed vulnerabilities
923 bug bounties with 1,850 websites
18,720 researchers, 1197 honor badges

singhnitesh21 | Security Researcher Profile


Security researcher singhnitesh21 has already helped fix 243 vulnerabilities.



Researcher reputation:  140

Real name:
Nitesh Singh

How to contact me:
E-MAIL
[email protected]

Experience in Application Security
< 1 year

Award / Bug Bounty I prefer:
I prefer :
- Rewards
- Benefits Gifts
- Swag
- Hall of Fame
- Acknowledgment
- PayPal Money : paypal.me/singhnitesh21

Follow me on:
Twitter
LinkedIn

Recommendations and Acknowledgements

@kitnospt     22 September, 2020
    Twitter kitnospt kitnospt from Hijiffy:
Thanks for all the help and detailed reporting
@wall26com     3 September, 2020
    Twitter wall26com Wall26 from Wall26:
Thanks for reporting the wordpress user disclosure issue. Good work!
@zaikoio     28 August, 2020
    Twitter zaikoio Zaiko from Zaiko:
Great work. Thank you for the thorough report.
@StefanCink     6 August, 2020
    Twitter StefanCink Stefan Cink from Net at Work:
Thanks to @singhnitesh21 we were able to close a vulnerability on our website asap. Thank you!
@LeahBecerra     26 June, 2020
    Twitter LeahBecerra Leah from Nieman Foundation:
Thanks, @singhnitesh21, for getting my attention and disclosing a vulnerability that needed a fix on our site! When I reached out for more info, your response was quick and gave the information we needed to patch the issue.
@duocirclellc     8 May, 2020
    Twitter duocirclellc Brad from Duo Circle:
Thank you to @singhnitesh21 for your responsible disclosure. It was an easy to implement remediation. Appreciate the approach you took by using the open bug bounty system.
@darcyf1     2 May, 2020
    Twitter darcyf1 Darcy from DarcyF1:
Provided a pointer that a directory with scripts was browsable because of an .htaccess misconfiguration which led to a quick resolution - thank you!
@jds88y     8 April, 2020
    Twitter jds88y Jason Sadler from GeoData Institute, University of Southampton:
Thank you to @singhnitesh21 for reporting and providing prompt and courteous details of a bug on our website, leading to a quick and pain free resolution. Keep up the good work.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Secured Websites Badge
50+ Secured Websites Badge
500+ Secured Websites Badge
Web Security Veteran Badge
10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser Badge
CSRF Master Badge
AppSec Logic Master Badge
Fastest Fix Badge
WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB Badge
OBB Advocate Badge
Improved OBB Badge
Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master Badge
Patch Guru Badge
Patch Lord Badge
Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE Badge
FAMOUS Badge
GLOBALLY TRUSTED Badge
REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

Distinguished Blog Author Badge
Distinguished Blog Author Badge
Distinguished Blog Author Badge
1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:342
Total reports on VIP sites:78
Total patched vulnerabilities:243
Total vulnerabilities on Hold (Open Bug Bounty):36
Recommendations received:8
Active since:20.03.2020

Open Bug Bounty Certificate


Researcher Certificate



No posts in blog yet


Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
02.10.2020
On Hold
Cross Site Scripting
02.10.2020
On Hold
Cross Site Scripting
30.09.2020
On Hold
Cross Site Scripting
30.09.2020
On Hold
Cross Site Scripting
22.09.2020
patched
Improper Access Control 
17.09.2020
patched
Improper Access Control 
16.09.2020
On Hold
Cross Site Scripting
16.09.2020
On Hold
Cross Site Scripting
16.09.2020
On Hold
Cross Site Scripting
16.09.2020
On Hold
Cross Site Scripting
11.09.2020
On Hold
Cross Site Scripting
09.09.2020
patched
Improper Access Control 
08.09.2020
patched
Improper Access Control 
08.09.2020
patched
Improper Access Control 
03.09.2020
patched
Cross Site Scripting
03.09.2020
On Hold
Cross Site Scripting
03.09.2020
On Hold
Cross Site Scripting
03.09.2020
On Hold
Cross Site Scripting
25.08.2020
On Hold
Cross Site Scripting
25.08.2020
On Hold
Cross Site Scripting

  Latest Patched

 23.10.2020 untappd.com
 23.10.2020 petmd.com
 23.10.2020 dafont.com
 23.10.2020 skylum.com
 23.10.2020 mtcom.ws
 23.10.2020 ibtimes.com
 23.10.2020 goo-net.com
 22.10.2020 totaljobs.com
 22.10.2020 gamesindustry.biz

  Latest Blog Posts

05.10.2020 by _r00t1ng_
Steal IP Address using Image
05.10.2020 by _r00t1ng_
DDOS Using SQL injection (SiDDOS)
05.10.2020 by _r00t1ng_
XSS Injection with SQLi
14.09.2020 by aninda_anon
VPS Cheatsheet for bug hunting
14.09.2020 by pk_12397
A Story of IDOR To Account Takeover

  Recent Recommendations

@mako_o9999     23 October, 2020
    Twitter mako_o9999:
Gdattacker found a XSS problem on one of our websites and reported to us. We were able to solve the problem quickly. Thank you so much!
@BizzdoD     21 October, 2020
    Twitter BizzdoD:
Many thanks to Sithu for bringing a XSS vulnerability on our site to our attention. He was very courteous in communications and helped verify that our patch solved the problem properly. Thank you Sir for helping making the Internet a safer place.
@vadus     19 October, 2020
    Twitter vadus:
Warbid helped disclose several vulnerabilities on our website. With his help, we were able to patch this issue and close up the vulnerability. Thank you very much for your help, and thank you for helping to make the web a safer place.
@pagel     18 October, 2020
    Twitter pagel:
Many thanks to cyberaz0r for pointing out a css vulnerability on our site. He was very pleasant to deal with and shared his knowledge openly.
@amswebs     16 October, 2020
    Twitter amswebs:
Thank you for your help with this XSS vulnerability. We appreciate the responsible reporting via openbugbounty.