Report a Vulnerability
Submit, help fixing, get kudos.
Start a Bug Bounty
Run your bounty program for free.
733,909 coordinated disclosures
435,695 fixed vulnerabilities
1141 bug bounties with 2,191 websites
20,551 researchers, 1254 honor badges

PauloChoupina | Security Researcher Profile

Security researcher PauloChoupina has already helped fix 76 vulnerabilities.

Researcher reputation:  130

Real name:
Paulo Choupina

About me:
Just a white hat hacker and some of his achievements.

How to contact me:
[email protected]

Experience in Application Security
over 5 years

Award / Bug Bounty I prefer:
Just a nice comment on my profile is enough, thanks.

Halls of Fame:
November 2019 position 9

Follow me on:

Recommendations and Acknowledgements

@pmbfurtado     18 March, 2019
    Twitter pmbfurtado Pedro Furtado from CustoJusto:
Paulo Choupina found and responsibly reported a vulnerability on our site. Thanks, Paulo for your help!
@nomuthetart     20 June, 2019
    Twitter nomuthetart NathanB from [email protected]:
Paulo alerted us to a XSS vulnerability and when we had difficulty reproducing it walked us through his process which allowed us to patch it.
@anorwood     18 June, 2019
    Twitter anorwood Adam Norwood from The University of Texas School of Law:
Thanks for pointing out an XSS vulnerability in the markup of one of our applications. Good to have it patched up.
@JuniorTidal     18 June, 2019
    Twitter JuniorTidal Junior Tidal from NYCCT Library:
Thank you Paulo for sharing your expertise. It is much appreciated!
@mike_bobbitt     14 June, 2019
    Twitter mike_bobbitt Mike Bobbitt from
Paulo was very helpful in identifying vulnerabilities with our service - thanks!
@gerryswan2     7 June, 2019
    Twitter gerryswan2 Gerry Swan from University of Kentucky:
Thanks Paulo for your thorough feedback. It was an easy fix with your help and examples.
@filiperfreitas     4 June, 2019
    Twitter filiperfreitas Filipe Freitas from JM:
Thank you Paulo for detecting and helping us fix the vulnerabilities. Much appreciated.
@filiperfreitas     4 June, 2019
    Twitter filiperfreitas Rodrigo Freitas from JM:
Thank you for sharing your findings Paulo and the way to correct them!

Please login via Twitter to add a recommendation

Honor Badges

Number of Secured Websites

10+ Secured Websites Badge
50+ Secured Websites Badge
500+ Secured Websites Badge
Web Security Veteran Badge
10+ Websites
50+ Websites
500+ Websites
1000+ Websites

Advanced Security Research

WAF Bypasser Badge
CSRF Master Badge
AppSec Logic Master Badge
Fastest Fix Badge
WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB Badge
OBB Advocate Badge
Improved OBB Badge
Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master Badge
Patch Guru Badge
Patch Lord Badge
Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

10+ Recommends
25+ Recommends
50+ Recommends

Distinguished Blog Author

Distinguished Blog Author Badge
Distinguished Blog Author Badge
Distinguished Blog Author Badge
1 Post
3 Posts
5+ Posts

Research Statistics

Total reports:190
Total reports on VIP sites:30
Total patched vulnerabilities:76
Total vulnerabilities on Hold (Open Bug Bounty):3
Recommendations received:8
Active since:12.03.2019

Open Bug Bounty Certificate

Researcher Certificate

No posts in blog yet

Reported Vulnerabilities

All Submissions VIP Submissions

  Latest Patched


  Latest Blog Posts

25.12.2020 by _Y000_
How to bypass mod_security (WAF)
10.12.2020 by _Y000_
sql injection to bypass Mod_Security
10.12.2020 by _Y000_
Create encoded sql payloads
26.10.2020 by _r00t1ng_
Bypass Addslashes using Multibyte Character
26.10.2020 by _r00t1ng_
One Payload to Inject them all - MultiQuery Injection

  Recent Recommendations

@smiteworks     15 January, 2021
    Twitter smiteworks:
Rajesh was very helpful in providing information and penetration testing on our site. With this information, we were able to harden our infrastructure.
@mhmitu     15 January, 2021
    Twitter mhmitu:
Hi Praveen,
Thanks for the help with the vulnerability. Very fast and friendly contact.
@matrixrewriter     15 January, 2021
    Twitter matrixrewriter:
We had no idea that this vulnerability existed in many PHP-based websites and you kindly reported it to us. Thanks for your help and all the best for your career!
@SilensStudio     14 January, 2021
    Twitter SilensStudio:
Thank you very much for informing us about our access vulnerability! The world needs more good guys like you! A+!
@JoseLev41970568     14 January, 2021
    Twitter JoseLev41970568:
Specialist in web application penetration tester, student and passionate about computer security and ethical hacking.