Predictable Voucher Identifier Enumeration in Cibus (Victory Integration)25 January 2026·6 minsSecurity Research Security Research Enumeration Weak Identifiers Business Logic Supply-Chain Risk Luhn Algorithm
Exploiting Layout Logic for DOM-Based XSS in react-show-more-text20 January 2026·6 minsSecurity Research Zero-Day React XSS Supply Chain
The Trust Fall: Bypassing a City-Wide Payment Ecosystem12 January 2026·8 minsSecurity Research Web Vulnerabilities Logic Flaws Phishing Fintech
How an Unpatched Zero-Day in a React Library Exposed Corporate Data, Employee Credentials, and Financial Assets28 December 2025·10 minsSecurity Research XSS Supply Chain Zero-Day Credential Harvesting Red Teaming
Exposing Top Secret IDF Documents: The Danger of Improper Digital Redaction5 November 2025·2 minsSecurity Research Data Leak Redaction Failure IDF Responsible Disclosure Information Security
The 1-Shekel Ticket: Broken Access Control, Mass PII Exposure, and Price Manipulation in a Concert Ticketing Platform17 September 2024·4 minsSecurity Research IDOR Broken Access Control Business Logic PII Exposure Web Security