Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
734,368 coordinated disclosures
435,760 fixed vulnerabilities
1141 bug bounties with 2,191 websites
20,556 researchers, 1254 honor badges

EzioPagliaTop-50 VIP Open Redirect Reporter Top Security Researcher of the Month | Security Researcher Profile


Security researcher EzioPaglia has already helped fix 2530 vulnerabilities.



Researcher reputation:  820

Real name:
Ezio Paglia

About me:
My name is Ezio Paglia, I was born in Roccastrada (Grosseto) on December 1st 1959, I live in Grosseto (a town in the south of Tuscany - Italy), where I work as a system administrator for the data centre of the municipality. I have been dealing with security for some years.

How to contact me:
mailto : [email protected]

Alternative Contacts:
mailto : [email protected]

Certifications & Diplomas:
Computer Science - University of Pisa ( Italy ) - Laurea in 1984 - 110 e lode

Experience in Application Security
3-5 years

Award / Bug Bounty I prefer:
Hall of Fame
Recommendations on Linkedin https://www.linkedin.com/in/ezio-paglia-3704196/
Recommendations on OBB
Books
Thanks

Halls of Fame:
FastWeb, Altervista, At&t, Telecom Italia, Siemens, Chemnitz Univ, Bosch, Top 50 and Top 50 VIP on OpenBugBounty

Recommendations and Acknowledgements

@QuetteRene     5 January, 2021
    Twitter QuetteRene Security Team from Xsalto:
Merci de votre implication dans la sécurisation du site.
Votre intervention a été très utile et appréciée.
@shunn     7 December, 2020
    Twitter shunn Bill from Sinister Regard Publishers:
Thanks for finding the XSS vulnerability. We have patched it swiftly, thanks to your vigilance.
@w3c_systeam     24 November, 2020
    Twitter w3c_systeam Systems Team from W3C:
Thank you for your report. We fixed the issue.
@jshrc     6 October, 2020
    Twitter jshrc Josh Rice from UNL-CCFL:
Thanks for reporting this issue, and for being so responsive!
@rundumsbaby     4 September, 2020
    Twitter rundumsbaby rundumsbaby from rundumsbaby:
Thank you very much for the report. Very helpful.
@cyberday_gmbh     27 August, 2020
    Twitter cyberday_gmbh CYBERDAY from CYBERDAY:
thx for reporting xss issue
@NewLineHorizon1     3 August, 2019
    Twitter NewLineHorizon1 Melisa from NewLineHorizon:
Dear,

Thanks for participating in responsible disclosure program.
The reports you submitted were extremely helpful to our team and provided us the details we needed to resolve the issues that you identified.
We are deeply committed to provide a safe and secure experience to our users and are therefore grateful for your efforts to help us improve our services.

Best Regards!
@aboros     13 June, 2019
    Twitter aboros Boris from Officeshoes:
Good find! Thank you
@wirismath     28 May, 2019
    Twitter wirismath Marketing & Communications from WIRIS MATH:
We want to thank EzioPaglia for detecting a security issue in one of our websites. He provided us details and gave us online support. We fixed the vulnerability with his valuable help ;)
@ziduniwien     28 May, 2019
    Twitter ziduniwien Computer Center from University of Vienna:
Dear EzioPaglia,

The University of Vienna would like to thank you for your valuable contribution in finding multiple website security issues. Your input is highly welcome and helps to raise the security level of our educational institution.

Servus and greetings from Vienna, Austria.

Shows the first 10 recommendations. See all.

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Secured Websites Badge
50+ Secured Websites Badge
500+ Secured Websites Badge
Web Security Veteran Badge
10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser Badge
CSRF Master Badge
AppSec Logic Master Badge
Fastest Fix Badge
WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB Badge
OBB Advocate Badge
Improved OBB Badge
Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master Badge
Patch Guru Badge
Patch Lord Badge
Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE Badge
FAMOUS Badge
GLOBALLY TRUSTED Badge
REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

Distinguished Blog Author Badge
Distinguished Blog Author Badge
Distinguished Blog Author Badge
1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:7215
Total reports on VIP sites:496
Total patched vulnerabilities:2530
Total vulnerabilities on Hold (Open Bug Bounty):1531
Recommendations received:36
Active since:26.12.2018
Top VIP Security Researcher Awards: Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week

Open Bug Bounty Certificate


Researcher Certificate



No posts in blog yet


Reported Vulnerabilities

All Submissions VIP Submissions

  Latest Patched

 16.01.2021 liveinternet.ru
 16.01.2021 kickit.to
 16.01.2021 sante.fr
 16.01.2021 gehaltsvergleich.com
 16.01.2021 qub.ac.uk
 16.01.2021 bostonglobe.com
 16.01.2021 inshallah.com
 16.01.2021 quantcast.com
 15.01.2021 klerk.ru
 14.01.2021 engineering.com

  Latest Blog Posts

25.12.2020 by _Y000_
How to bypass mod_security (WAF)
10.12.2020 by _Y000_
sql injection to bypass Mod_Security
10.12.2020 by _Y000_
Create encoded sql payloads
26.10.2020 by _r00t1ng_
Bypass Addslashes using Multibyte Character
26.10.2020 by _r00t1ng_
One Payload to Inject them all - MultiQuery Injection

  Recent Recommendations

@smiteworks     15 January, 2021
    Twitter smiteworks:
Rajesh was very helpful in providing information and penetration testing on our site. With this information, we were able to harden our infrastructure.
@mhmitu     15 January, 2021
    Twitter mhmitu:
Hi Praveen,
Thanks for the help with the vulnerability. Very fast and friendly contact.
@matrixrewriter     15 January, 2021
    Twitter matrixrewriter:
We had no idea that this vulnerability existed in many PHP-based websites and you kindly reported it to us. Thanks for your help and all the best for your career!
@SilensStudio     14 January, 2021
    Twitter SilensStudio:
Thank you very much for informing us about our access vulnerability! The world needs more good guys like you! A+!
@JoseLev41970568     14 January, 2021
    Twitter JoseLev41970568:
Specialist in web application penetration tester, student and passionate about computer security and ethical hacking.