Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
613,673 coordinated disclosures
393,525 fixed vulnerabilities
929 bug bounties with 1,869 websites
18,826 researchers, 1199 honor badges

singhnitesh21 | Security Researcher Profile


Security researcher singhnitesh21 has already helped fix 245 vulnerabilities.



Researcher reputation:  150

Real name:
Nitesh Singh

How to contact me:
E-MAIL
[email protected]

Experience in Application Security
< 1 year

Award / Bug Bounty I prefer:
I prefer :
- Rewards
- Benefits Gifts
- Swag
- Hall of Fame
- Acknowledgment
- PayPal Money : paypal.me/singhnitesh21

Follow me on:
Twitter
LinkedIn

Recommendations and Acknowledgements

@notedekd     28 October, 2020
    Twitter notedekd Waroros from Dek-D:
Thank for the detail reporting.
@kitnospt     22 September, 2020
    Twitter kitnospt kitnospt from Hijiffy:
Thanks for all the help and detailed reporting
@wall26com     3 September, 2020
    Twitter wall26com Wall26 from Wall26:
Thanks for reporting the wordpress user disclosure issue. Good work!
@zaikoio     28 August, 2020
    Twitter zaikoio Zaiko from Zaiko:
Great work. Thank you for the thorough report.
@StefanCink     6 August, 2020
    Twitter StefanCink Stefan Cink from Net at Work:
Thanks to @singhnitesh21 we were able to close a vulnerability on our website asap. Thank you!
@LeahBecerra     26 June, 2020
    Twitter LeahBecerra Leah from Nieman Foundation:
Thanks, @singhnitesh21, for getting my attention and disclosing a vulnerability that needed a fix on our site! When I reached out for more info, your response was quick and gave the information we needed to patch the issue.
@duocirclellc     8 May, 2020
    Twitter duocirclellc Brad from Duo Circle:
Thank you to @singhnitesh21 for your responsible disclosure. It was an easy to implement remediation. Appreciate the approach you took by using the open bug bounty system.
@darcyf1     2 May, 2020
    Twitter darcyf1 Darcy from DarcyF1:
Provided a pointer that a directory with scripts was browsable because of an .htaccess misconfiguration which led to a quick resolution - thank you!
@jds88y     8 April, 2020
    Twitter jds88y Jason Sadler from GeoData Institute, University of Southampton:
Thank you to @singhnitesh21 for reporting and providing prompt and courteous details of a bug on our website, leading to a quick and pain free resolution. Keep up the good work.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Secured Websites Badge
50+ Secured Websites Badge
500+ Secured Websites Badge
Web Security Veteran Badge
10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser Badge
CSRF Master Badge
AppSec Logic Master Badge
Fastest Fix Badge
WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB Badge
OBB Advocate Badge
Improved OBB Badge
Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master Badge
Patch Guru Badge
Patch Lord Badge
Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE Badge
FAMOUS Badge
GLOBALLY TRUSTED Badge
REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

Distinguished Blog Author Badge
Distinguished Blog Author Badge
Distinguished Blog Author Badge
1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:358
Total reports on VIP sites:83
Total patched vulnerabilities:245
Total vulnerabilities on Hold (Open Bug Bounty):48
Recommendations received:9
Active since:20.03.2020

Open Bug Bounty Certificate


Researcher Certificate



No posts in blog yet


Reported Vulnerabilities

All Submissions VIP SubmissionsFeatured Submissions

Domain Reported Status Type
30.07.2020
patched
Improper Access Control 
30.07.2020
patched
Improper Access Control 
30.07.2020
patched
Improper Access Control 
30.07.2020
patched
Improper Access Control 
30.07.2020
patched
Improper Access Control 
30.07.2020
patched
Improper Access Control 
30.07.2020
patched
Improper Access Control 
29.07.2020
patched
Improper Access Control 
29.07.2020
patched
Improper Access Control 
28.07.2020
patched
Improper Access Control 
28.07.2020
patched
Improper Access Control 
28.07.2020
patched
Improper Access Control 
24.07.2020
patched
Improper Access Control 
24.07.2020
patched
Improper Access Control 
23.07.2020
patched
Cross Site Scripting
19.07.2020
patched
CSRF
19.07.2020
patched
CSRF
19.07.2020
patched
CSRF
17.07.2020
patched
Improper Access Control 
17.07.2020
patched
Improper Access Control 

  Latest Patched

 31.10.2020 adsglobe.com
 31.10.2020 huduser.gov
 30.10.2020 prensa-latina.cu
 30.10.2020 dek-d.com
 30.10.2020 123rf.com
 30.10.2020 t3n.de
 30.10.2020 489pro.com
 30.10.2020 dgtle.com
 29.10.2020 photobucket.com
 29.10.2020 istockphoto.com

  Latest Blog Posts

26.10.2020 by _r00t1ng_
Bypass Addslashes using Multibyte Character
26.10.2020 by _r00t1ng_
One Payload to Inject them all - MultiQuery Injection
26.10.2020 by _r00t1ng_
Routed SQL Injection
26.10.2020 by _r00t1ng_
DIOS the SQL Injectors Weapon
26.10.2020 by p4c3n0g3
How to find AngularJS XSS

  Recent Recommendations

@benskiddle     30 October, 2020
    Twitter benskiddle:
Great disclosure of an SQL injection bug with good details to replicate the issue. Thank you.
@MizoueShumpei     29 October, 2020
    Twitter MizoueShumpei:
Thank you very much for your help.
@adridder     28 October, 2020
    Twitter adridder:
Thank you for your help with this XSS vulnerability on our site. We appreciate the responsible reporting via openbugbounty.
@gaborvitez     28 October, 2020
    Twitter gaborvitez:
Ajaysen R found a reflected cross site scripting bug in one of our cgi scripts, this way he helped us improve the security of our website. He was really fast to react, working with him was really a pleasure. We are grateful for the issues he made us aware of.
@Jobe1986     28 October, 2020
    Twitter Jobe1986:
Thank you for your efforts and reporting the XSS vulnerability you found on my website.