InJavaScript in Plain EnglishbyAswin KVClient Side Template Injection (CSTI)Impact, Exploitation, and Recommended Mitigation MeasuresMay 21, 2023May 21, 2023
InILLUMINATIONbyAswin KVExploiting Paypal Payment Gateway Results In Free ShoppingHello everyone, I’m Aswin ,Security Researcher from Kerala,India.Mar 13, 2023Mar 13, 2023
InInfoSec Write-upsbyAswin KVReflected XSS on Admin Login PageHi! I’m Aswin,security researcher and a penetration tester.Here we are discussing reflected XSS in a private bug bounty program.Mar 21, 2023Mar 21, 2023
InSystem WeaknessbyAswin KVUnicode Normalization Leads to Account TakeoverHello everyone,Mar 23, 20232Mar 23, 20232
InSystem WeaknessbyAswin KVOpen Redirect Vulnerability: A Potential Threat to User SecurityA Bug Bounty Report on the Risks of Unvalidated URL Redirections in Websites and ApplicationsMar 31, 2023Mar 31, 2023
InSystem WeaknessbyAswin KVStored DOM XSSDiscovering and addressing a critical security flawApr 5, 2023Apr 5, 2023
InSystem WeaknessbyAswin KVSMTP InjectionHow a Single Email Can Compromise Your SecurityApr 13, 20231Apr 13, 20231
InInfoSec Write-upsbyAswin KVLDAP InjectionA Critical Security Flaw Exposing the Application to LDAP Injection AttacksMay 2, 20231May 2, 20231
InInfoSec Write-upsbyAswin KVURN InjectionHigh-severity vulnerability enables unauthorized access and potential data leakage.May 26, 2023May 26, 2023
InSystem WeaknessbyAswin KVCritical Union-Based SQL Injection VulnerabilityUnauthorized Access and Data Leakage via Union-Based SQL InjectionMay 30, 20231May 30, 20231