PinnedVedavyasan S (@ved4vyasan)inSystem WeaknessBeyond RAM and ROM: IDOR Leads to Unauthenticated File Upload Vulnerability in Indian Government…Insecure direct object references to file upload3 min read·Mar 23, 2024----
PinnedVedavyasan S (@ved4vyasan)inSystem WeaknessBLH VULNERABILITYBLH Vulnerability2 min read·Jun 9, 2023----
PinnedVedavyasan S (@ved4vyasan)inSystem WeaknessHtml Injection On One Of The Indian Government’s Official DomainSTORY OF AN HTML INJECTION ON ONE THE OF THE #INDIAN GOVERNMENT’S OFFICIAL DOMAIN2 min read·Feb 22, 2023----
PinnedVedavyasan S (@ved4vyasan)HOW I HACKED DIFFERENT IIT’s IN INDIASTORY OF VULNERABILITIES FOUND ON IIT GUWAHATI AND JODHPUR3 min read·Mar 1, 2023--1--1
PinnedVedavyasan S (@ved4vyasan)inSystem WeaknessHow i made the multiple hall of fame in Nokia within 2 minutesHoF (HALL OF FAME) for reporting a sinlge bug on their several domains through their Nokia vulnerability disclosure4 min read·Sep 17, 2022--1--1
Vedavyasan S (@ved4vyasan)inSystem WeaknessAmazon vulnerability that can flood user’s mailbox.Hello guys, Vedavyasan here👽✨.2 min read·Dec 17, 2022----
Vedavyasan S (@ved4vyasan)inSystem WeaknessText based injection | web vulnerability | low impactTEXT INJECTION Content spoofing attack also known as content text injection arbitary text injection or Virtual defacement is an…2 min read·Jun 5, 2022----