Authentication Bypass in Web Application
Discovered an authentication bypass vulnerability allowing unauthorized access to protected resources.
Full writeup pending vendor approval.
CVE disclosures, bug bounty findings, and responsible disclosure reports.
Findings awaiting vendor approval or coordinated disclosure.
Discovered an authentication bypass vulnerability allowing unauthorized access to protected resources.
Full writeup pending vendor approval.
Identified a stored cross-site scripting vulnerability in the administrative interface.
Full writeup pending vendor approval.
Found an API endpoint exposing sensitive user information without proper authorization checks.
Full writeup pending vendor approval.
Discovered an insecure direct object reference vulnerability that could lead to full account takeover.
Full writeup pending vendor approval.
Identified SQL injection vulnerability in the application's search feature.
Full writeup pending vendor approval.
All vulnerabilities listed here were reported through proper responsible disclosure channels. I work with vendors to ensure issues are patched before public disclosure. If you're a vendor and need to contact me regarding a security issue, please reach out via email.
Interested in my security research or have a bug bounty program?