Sagar SajeevXSS using a usernameXSS triggered by exploiting a vulnerable input field of a signup page.2 min read·Nov 14, 2022--1--1
Sagar SajeevEscalating SSTI to Reflected XSS using curly braces { }SSTI -> Self XSS -> RXSS3 min read·Sep 24, 2022--3--3
Sagar SajeevUnsubscribe any user’s e-mail notifications via IDORIDOR allows attacker to unsubscribe any user from the Websites email service.3 min read·Aug 28, 2022--5--5
Sagar SajeevBusiness Logic Vulnerability via IDORExploiting a Logic Vuln via IDOR. #Bugbounty3 min read·Aug 15, 2022--3--3
Sagar SajeevEscalating Open Redirect to XSSHello everyone. Myself Sagar Sajeev.2 min read·Aug 13, 2022--2--2
Sagar SajeevAn Unusual Tale of Email Verification BypassHey Guys. I’m Sagar Sajeev .3 min read·Aug 13, 2022--3--3
Sagar SajeevFile Upload Bypass to RCE == $$$$Multiple ways to Bypass a File upload feature and chain it to an RCE.4 min read·Aug 12, 2022--9--9
Sagar SajeevBrowser Extensions which have landed $$$ !What’s up everybody. My name is Sagar Sajeev.3 min read·Aug 12, 2022--3--3
Sagar SajeevServer Side Template Injection-Something Distinct!How’s it going guys! My name is Sagar Sajeev and this is my writeup about one of my recent SSTI (Server Side Template Injection) finding.3 min read·Aug 4, 2022--1--1
Sagar SajeevBusiness Logic Vulnerabilities == $$$According to OWASP , Business Logic Vulnerabilities are ways of using the legitimate processing flow of an application in a way that…3 min read·Jul 29, 2022--6--6