Infosec Institute

Open Bug Bounty mentioned in the
Top 6 Bug Bounty programs of
2022 by the InfoSec Institute

The Hacker News

Open Bug Bounty named among the
Top 5 Bug Bounty programs of 2021
by The Hacker News

Platform update: please use our new authentication mechanism to securely use the Open Bug Bounty Platform.
For security researchers
Report a Vulnerability
Submit, help fixing, get kudos.
For website owners
Start a Bug Bounty
Run your bounty program for free.
1,704,865 coordinated disclosures
1,383,494 fixed vulnerabilities
1,991 bug bounty programs, 3,919 websites
47,088 researchers, 1,652 honor badges

EzioPagliaTop-50 VIP Open Redirect Reporter Top Security Researcher of the Month Top VIP Security Researcher of the Month | Security Researcher Profile


Security researcher EzioPaglia has already helped fix 5602 vulnerabilities.



Researcher reputation:  1090

Real name:
Ezio Paglia

About me:
My name is Ezio Paglia, I was born in 1959, I live in Grosseto (a town in the south of Tuscany - Italy). I was the sysadmin of the data centre of Grosseto municipality. Retired since July 2022. I have been dealing with security for some years.

Contact email:
mailto : [email protected]

Certifications & Diplomas:
Computer Science - University of Pisa ( Italy ) - Laurea in 1984 - Logica Matematica.

Experience in Application Security
over 5 years

Award / Bug Bounty I prefer:
Books or e-books on IT security, theory of numbers, theory of games, gifts or small donations.
Hall of Fame, Recommendations on OBB or LinkedIn.
Thanks.

Halls of Fame:
FastWeb, Altervista, At&t, Telecom Italia, Siemens, Chemnitz Univ, Bosch, Top 50 and Top 50 VIP on OpenBugBounty

Follow me on:
Twitter
LinkedIn

Ethics and Rules:
Ezio Paglia is required to abide by the ethics and rules of the Open Bug Bounty project. If you reasonably believe that rules are not respected, please report this to us.

Recommendations and Acknowledgements | Full List:

@genoverband     2 April, 2024
    Twitter genoverband Dominick from Genoverband e.V.:
Thank you for your invaluable help in ensuring the security of our domain and its visitors!
@Krok141     6 March, 2024
    Twitter Krok141 Krok141 from Tabor A Je To:
Thank you for reporting the issues, good work.
@CERT_rlp     10 October, 2023
    Twitter CERT_rlp CERT-rlp from CERT-rlp:
The team of CERT-rlp would like to thank EzioPaglia once again for a responsible and coordinated disclosure of XSS and SQLi vulnerabilities
@dusalnet     5 September, 2023
    Twitter dusalnet Almas from Dusal.net:
Thank you very much for reporting the vulnerability. Good luck with your everything!!!
@GtBib     4 September, 2023
    Twitter GtBib Josep from directorioexit.info:
Your report was very helpful! Thank you very much !
@MPDL     20 June, 2023
    Twitter MPDL Benjamin from Max Planck Digital Library:
Thank you for reporting a vulnerability on our website. We fixed it in the new version and shut down the test instance.
@MinasPergantis     23 May, 2023
    Twitter MinasPergantis Minas from Ionio:
Thank you for your help in ensuring the security of our domain and its visitors! Your contributions are invaluable.
@Freedback_com     4 May, 2023
    Twitter Freedback_com Steve from Freedback.com:
Thanks, Ezio, for identifying the XSS vulnerability, and for our friendly email exchange!
@fknipp     4 April, 2023
    Twitter fknipp Franz from qnipp:
Thanks for pointing out the issue.
@travelfish     17 March, 2023
    Twitter travelfish Stuart from Travelfish:
Thanks for finding the issuing, passing on your find, and the quick reply. Cheers!
@MrMoney84315336     15 March, 2023
    Twitter MrMoney84315336 Jens Weck from Mr-Money Software GmbH:
Thank you for reporting the issues, good work.
@vovsoft     23 February, 2023
    Twitter vovsoft Fatih from Vovsoft:
Great work. We fixed the issue.
@CERT_rlp     10 February, 2022
    Twitter CERT_rlp CERT-rlp from CERT-rlp:
The team of CERT-rlp would like to thank EzioPaglia again for a responsible and coordinated disclosure of several XSS vulnerabilities
@EreMaijala     2 February, 2022
    Twitter EreMaijala Ere Maijala from The National Library of Finland:
Thank you for disclosing a vulnerability responsibly!
@wdbacker     23 November, 2021
    Twitter wdbacker wdbacker from Paradisio:
Thank you for reporting a vulnerability on our website. We fixed it and really appreciate your input!
@CERT_rlp     18 January, 2021
    Twitter CERT_rlp CERT-rlp from CERT-rlp:
The team of CERT-rlp would like to thank EzioPaglia for a responsible and coordinated disclosure of vulnerabilities
@QuetteRene     5 January, 2021
    Twitter QuetteRene Security Team from Xsalto:
Merci de votre implication dans la sécurisation du site.
Votre intervention a été très utile et appréciée.
@shunn     7 December, 2020
    Twitter shunn Bill from Sinister Regard Publishers:
Thanks for finding the XSS vulnerability. We have patched it swiftly, thanks to your vigilance.
@w3c_systeam     24 November, 2020
    Twitter w3c_systeam Systems Team from W3C:
Thank you for your report. We fixed the issue.
@jshrc     6 October, 2020
    Twitter jshrc Josh Rice from UNL-CCFL:
Thanks for reporting this issue, and for being so responsive!
@rundumsbaby     4 September, 2020
    Twitter rundumsbaby rundumsbaby from rundumsbaby:
Thank you very much for the report. Very helpful.
@cyberday_gmbh     27 August, 2020
    Twitter cyberday_gmbh CYBERDAY from CYBERDAY:
thx for reporting xss issue
@NewLineHorizon1     3 August, 2019
    Twitter NewLineHorizon1 Melisa from NewLineHorizon:
Dear,

Thanks for participating in responsible disclosure program.
The reports you submitted were extremely helpful to our team and provided us the details we needed to resolve the issues that you identified.
We are deeply committed to provide a safe and secure experience to our users and are therefore grateful for your efforts to help us improve our services.

Best Regards!
@aboros     13 June, 2019
    Twitter aboros Boris from Officeshoes:
Good find! Thank you
@wirismath     28 May, 2019
    Twitter wirismath Marketing & Communications from WIRIS MATH:
We want to thank EzioPaglia for detecting a security issue in one of our websites. He provided us details and gave us online support. We fixed the vulnerability with his valuable help ;)
@ziduniwien     28 May, 2019
    Twitter ziduniwien Computer Center from University of Vienna:
Dear EzioPaglia,

The University of Vienna would like to thank you for your valuable contribution in finding multiple website security issues. Your input is highly welcome and helps to raise the security level of our educational institution.

Servus and greetings from Vienna, Austria.
@enejcz     27 May, 2019
    Twitter enejcz Arkadiusz from Sterta.pl:
EzioPaglia found xss vulnerability on our website. We have fixed the issue. Thank you for your report!
@Admeus     23 May, 2019
    Twitter Admeus Dani from Soa:
EzioPaglia discovered a XSS breach in our site, thanks to him was resolved.
@LancasterUniSOC     20 May, 2019
    Twitter LancasterUniSOC John from LU:
Thank you very much for reporting the issue, it is greatly appreciated.
@CMCM_Webdesign     8 May, 2019
    Twitter CMCM_Webdesign Christopher from CMCM:
Thanks a lot for reporting the XSS vulnerability and providing an example, so I could easily see the problem and fix it. Very much appreciated!
@vinceverbruggen     4 May, 2019
    Twitter vinceverbruggen Vincent from Undisclosed:
Thank you for notifying us about the XSS vulnerability you found on one of our websites and the quick response in order for us to resolve the issue.
@CoolgearLabs     2 May, 2019
    Twitter CoolgearLabs Caleb from USBGear:
Thanks for the report and quick responses.
@AniDBStatus     21 April, 2019
    Twitter AniDBStatus AniDB from AniDB:
Thank you for reporting this bug. We appreciate your work!
@watergateweb     15 April, 2019
    Twitter watergateweb Alexios Tsiaparas from Watergate:
Another XSS vulnerability found, thanks a lot!
@evergreen_uk     27 March, 2019
    Twitter evergreen_uk Andrew from Evergreen:
Thanks Ezio, it's been a pleasure to deal with you.
@giroud_francois     27 March, 2019
    Twitter giroud_francois Giroud from WebLettres:
Thanks a lot for reporting, and helping ! Ezio is professional, he answers fast and seems to be a true gentleman ;)
@diogenesverlag     25 March, 2019
    Twitter diogenesverlag Susanne from Diogenes Verlag:
Thank you very much for reporting, you helped us a lot - fixed.
@rogerdc01     19 March, 2019
    Twitter rogerdc01 Roger from WEBenz:
Ezio has helped me with a vulnerability. Answered very fast after some questions and showed the way to examine the issue. Very professional!
@_light_dem     4 March, 2019
    Twitter _light_dem Matteo from Mys.it:
Professional, responds quickly, has helped us on more than one occasion
@despegar_appsec     23 February, 2019
    Twitter despegar_appsec Eliel from Despegar.com:
Ezio is extremely professional. The information provided was precise and we had no problem to fix the vulnerability reported. Thanks for helping us making our website more secure.
@michael_eckel     20 February, 2019
    Twitter michael_eckel Michael Eckel from Michael Eckel IT:
Thank you very much for helping me discover and fix several XSS vulnerabilities.
@cyberday_gmbh     18 February, 2019
    Twitter cyberday_gmbh DLO from CYBERDAY GmbH:
thanks for reporting again
@fisher_of_men11     11 February, 2019
    Twitter fisher_of_men11 Andy from Mudconnect.com:
Thank you again, another XSS vulnerability found and fixed!
@dsmithgard     11 February, 2019
    Twitter dsmithgard Dan Smith from Patton Electronics:
Responsive and very helpful in getting my issue patched.
@fisher_of_men11     9 February, 2019
    Twitter fisher_of_men11 Andy from Mudconnect.com:
Thank you for helping us discover an XSS vulnerability on mudconnect!
@cyberday_gmbh     8 February, 2019
    Twitter cyberday_gmbh DLO from CYBERDAY GmbH:
thanks for reporting
@wimo_de     4 February, 2019
    Twitter wimo_de Ekki Plicht from WiMo Antennen und Elektronik GmbH:
Thanks for pointing out yet another vulnerability :) Fixed.
@ClementBourgoin     26 January, 2019
    Twitter ClementBourgoin Clément Bourgoin from Biblys:
Thanks for warning be about another XSS vulnerability.
@laufpix     18 January, 2019
    Twitter laufpix laufpix from laufpix:
Thanks for helping us making our website more secure.
@MatthiasCramer     14 January, 2019
    Twitter MatthiasCramer Crami from FreeStone:
Competent and fast communication, thanks for notifining me about my XSS problem.
@ClementBourgoin     12 January, 2019
    Twitter ClementBourgoin Clément from Biblys:
Thanks for warning me about a XSS vulnerability.
@WritingCom     30 December, 2018
    Twitter WritingCom Owner from Writing.Com:
Thank you! OBB-715982 is patched. Have a happy new year!

Please login via Twitter to add a recommendation

Honor Badges


Number of Secured Websites

10+ Secured Websites Badge
50+ Secured Websites Badge
500+ Secured Websites Badge
Web Security Veteran Badge
10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser Badge
CSRF Master Badge
AppSec Logic Master Badge
Fastest Fix Badge
WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB Badge
OBB Advocate Badge
Improved OBB Badge
Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master Badge
Patch Guru Badge
Patch Lord Badge
Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE Badge
FAMOUS Badge
GLOBALLY TRUSTED Badge
REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

Distinguished Blog Author Badge
Distinguished Blog Author Badge
Distinguished Blog Author Badge
1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:11110
Total reports on VIP sites:817
Total patched vulnerabilities:5602
Total vulnerabilities on Hold (Open Bug Bounty):751
Recommendations received:52
Active since:26.12.2018
Top Security Researcher Awards:Gold Star Top Security Researcher of the Month
Top VIP Security Researcher Awards: Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Month Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week Top VIP Security Researcher of the Week

Open Bug Bounty Certificate


Researcher Certificate

Reported Vulnerabilities

All Submissions VIP Submissions




No posts in blog yet










  Latest Patched

 27.04.2024 agris.doa.gov.my
 27.04.2024 emsd.gov.hk
 26.04.2024 news.gov.mb.ca
 26.04.2024 mdanderson.org
 25.04.2024 seeu.edu.mk
 25.04.2024 xaxim.sc.gov.br
 25.04.2024 lacerdopolis.sc.gov.br
 24.04.2024 tap.mk.gov.lv

  Latest Blog Posts

04.12.2023 by BAx99x
Unmasking the Power of Cross-Site Scripting (XSS): Types, Exploitation, Detection, and Tools
04.12.2023 by a13h1_
$1120: ATO Bug in Twitter’s
04.12.2023 by ClumsyLulz
How I found a Zero Day in W3 Schools
04.12.2023 by 24bkdoor
Hack the Web like a Pirate: Identifying Vulnerabilities with Style
04.12.2023 by 24bkdoor
Navigating the Bounty Seas with Open Bug Bounty

  Recent Recommendations

    22 April, 2024
    genoverband:
Thank you for your invaluable help in ensuring the security of our domain and its visitors!
    10 April, 2024
    Mars:
Hatim uncovered a XSS bug that we were able to quickly resolve. Thanks very much for your assistance and help.
    8 April, 2024
    Panthermedia:
Thanks to the support of Hatim Chabik, we were able to identify and solve an XSS bug.
    5 April, 2024
    pubpharm:
Pooja found a XSS vulnerability on our website and provided us with the needed Information for replication and fixing the issue. Which she verified afterwards.
We thank her for the reporting and assistance.
    2 April, 2024
    genoverband:
Thank you for your invaluable help in ensuring the security of our domain and its visitors!