InJavaScript in Plain EnglishbyAswin KVClient Side Template Injection (CSTI)Impact, Exploitation, and Recommended Mitigation MeasuresMay 21, 2023May 21, 2023
InILLUMINATIONbyAswin KVExploiting Paypal Payment Gateway Results In Free ShoppingHello everyone, I’m Aswin ,Security Researcher from Kerala,India.Mar 13, 2023Mar 13, 2023
InInfoSec Write-upsbyAswin KVReflected XSS on Admin Login PageHi! I’m Aswin,security researcher and a penetration tester.Here we are discussing reflected XSS in a private bug bounty program.Mar 21, 2023Mar 21, 2023
InSystem WeaknessbyAswin KVUnicode Normalization Leads to Account TakeoverHello everyone,Mar 23, 2023A response icon2Mar 23, 2023A response icon2
InSystem WeaknessbyAswin KVOpen Redirect Vulnerability: A Potential Threat to User SecurityA Bug Bounty Report on the Risks of Unvalidated URL Redirections in Websites and ApplicationsMar 31, 2023Mar 31, 2023
InSystem WeaknessbyAswin KVStored DOM XSSDiscovering and addressing a critical security flawApr 5, 2023Apr 5, 2023
InSystem WeaknessbyAswin KVSMTP InjectionHow a Single Email Can Compromise Your SecurityApr 13, 2023A response icon1Apr 13, 2023A response icon1
InInfoSec Write-upsbyAswin KVLDAP InjectionA Critical Security Flaw Exposing the Application to LDAP Injection AttacksMay 2, 2023A response icon1May 2, 2023A response icon1
InInfoSec Write-upsbyAswin KVURN InjectionHigh-severity vulnerability enables unauthorized access and potential data leakage.May 26, 2023May 26, 2023
InSystem WeaknessbyAswin KVCritical Union-Based SQL Injection VulnerabilityUnauthorized Access and Data Leakage via Union-Based SQL InjectionMay 30, 2023A response icon1May 30, 2023A response icon1