Coordinated and Responsible Vulnerability Disclosure Free Bug Bounty Program 383,077 coordinated disclosures
217,702 fixed vulnerabilities
518 bug bounties with 1018 websites
10,297 researchers, 905 honor badges

Renzi | Security Researcher Profile


Security researcher Renzi has already helped fix 511 vulnerabilities.



Researcher reputation:  190

Real name:
Felipe Gabriel Renzi

About me:
Cyber Security Analyst from Brazil.

How to contact me:
E-mail: [email protected]

Certifications & Diplomas:
Forest Engineering & Information Security

Experience in Application Security
over 5 years

Award / Bug Bounty I prefer:
Bounty Payment (PayPal).
Public Recognition & thanks.
-
e.g. PayPal via [email protected]

Halls of Fame:
Acknowledged by SoundCloud, Western Union, Alibaba, T-mobile, Telefonica, Huawei, Skyscanner and Jet.

Follow me on:
Twitter

Recommendations and Acknowledgements

    2 May, 2019
     AndyTrier Andreas from Trier-Saarburg:
Felipe found a XSS flaw in one of our web pages, and kindly told us about it so that we could address it. We'd like to thank Felipe for his prompt and professional disclosure.
    30 April, 2019
     KoegelGmbH Daniel from Kögel:
Felipe kindly pointed out an XSS problem to us. Thanks to his support, we were able to solve the problem quickly.
Thank you very much Felipe, your help is highly appreciated!
    25 April, 2019
     artinberlin Christoph Thomessen from Kuag:
Felipe fand einen XSS Fehler in einer unserer Web-Seiten und gab uns Tipps für ein sicheres Internet. Vielen Dank.
    23 April, 2019
     buerofuenf Jens from Büro 5 GmbH:
Felipe found a XSS security vulnerability in one of our customers site. We fixed it accordingly. He was very fast in answering and very supportive. Thank you very much, your help is highly appreciated! We will keep you in mind for future security checks on other websites.
    15 April, 2019
     matthias_lueck Matthias Lück from Brinkmann Audio:
Felipe found a vulnerability in our website , which we were able to fix with Felipes detailed report. He was very responsive and professional. Highly recommended!
Thank you very much Felipe!
    22 January, 2019
     Majestic Philip Aggrey from Majestic:
Following Felipe's disclosure, we have now fixed the Reflected Cross-Site Scripting web vulnerability you discovered in our "www.majestic12.co.uk" web-application. We'd like to thank Felipe for his prompt and professional disclosure.
    22 January, 2019
     DJB31st Dave Beaumont :
Found a xss issue, quickly emailed with the affected pages and links to aid resolving. Many thanks
    2 November, 2018
     jddimarco John DiMarco from University of Toronto Computer Science Dept:
Felipe found a XSS flaw in one of our researchers' web pages, and kindly told us about it so that we could address it. Thank you, Felipe.
    15 May, 2019
     mrroessel Mario Rössel from Memory Alpha:
Felipe found a XSS vulnerability on my website. With his prompt help I was able to fix it.

Thank you very much Felipe!
    15 May, 2019
     Shopweezle Andreas from Company:
Thanks for help fixing issues.
fast communication; good job.

But this portal doesnt change status after fixing. Why?

Shows the first 10 recommendations. See all.

Please login via Twitter to add a recommendation

Awards and Achievements


Number of Secured Websites

10+ Websites
50+ Websites
500+ Websites
WEB SECURITY VETERAN
1000+ Websites

Advanced Security Research

WAF Bypasser
CSRF Master
30+ Reports
AppSec Logic Master
30+ Reports
Fastest Fix
Fix in 24 hours

Outstanding Achievements

Secured OBB
OBB Advocate
Improved OBB

Commitment to Remediate and Patch

Patch Master
55% Patched
Patch Guru
65% Patched
Patch Lord
75% Patched

Recommendations and Recognition

REPUTABLE
10+ Recommends
FAMOUS
25+ Recommends
GLOBALLY TRUSTED
50+ Recommends

Distinguished Blog Author

1 Post
3 Posts
5+ Posts

Research Statistics



Total reports:2702
Total reports on VIP sites:4
Total patched vulnerabilities:511
Total vulnerabilities on Hold (Open Bug Bounty):2011
Recommendations received:12
Active since:31.05.2018

Open Bug Bounty Certificate



01.05.2019  1000's of default passwords on http://open-sez.me

01.05.2019  Fuxploider - @almandin

" Fuxploider is an open source penetration testing tool that automates the process of detecting and exploiting file upload forms flaws. This tool is able to detect the file types allowed to be uploaded and is able to detect which technique will work best to upload web shells or any malicious file on the desired web server. "

01.05.2019  Sysadminotaur


Reported Vulnerabilities

All Submissions VIP Submissions

Domain Reported Status Type
11.11.2018
unpatched
Cross Site Scripting
28.10.2018
patched
Cross Site Scripting
14.10.2018
unpatched
Cross Site Scripting
03.06.2018
unpatched
Cross Site Scripting

  Latest Patched

 18.06.2019 condos.ca
 18.06.2019 topachat.com
 17.06.2019 onebackpage.com
 17.06.2019 lancs.ac.uk
 17.06.2019 cancer.net
 17.06.2019 nap-camp.com
 16.06.2019 bookys-gratuit.org
 16.06.2019 frontera.info
 16.06.2019 ittefaq.com.bd
 16.06.2019 xvideo-jp.com

  Latest Blog Posts

12.06.2019 by Open Bug Bounty
Open Bug Bounty pursues a steady growth in 2019 with over 212,148 fixed vulnerabilities
27.05.2019 by fakessh
bing openredirect
20.05.2019 by fakessh
Hitachi Incident Response Team (HIRT)
11.05.2019 by MAS00712
Footprinting and Reconnaissance with DIRB Tool (For Security Researcher and Bug Bounty Hunters)
01.05.2019 by Renzi25031469
1000's of default passwords on http://open-sez.me

  Recent Recommendations

    18 June, 2019
     opensolr:
Thank you for your notification and helping us build a safer environment for our users!
    17 June, 2019
     opensolr:
The research on the cross-domain vulnerability, was a very good catch !
Thank you very much for your time and professional report !
    17 June, 2019
     opensolr:
The work that Shah has done for us it priceless!
We can not begin to describe the level of detail, and professional reporting, and dedication that this great security expert has helped us with.
Always, highly recommended !
    17 June, 2019
     ITTagesschau:
Thank you, for your professional and quick guidiance, about our security flaw
    17 June, 2019
     opensolr:
Thank you for your great work and professional report!
You found a vital security issue, that allowed us to move forward to our development !

Thank you again for your time and dedication!