You are sharing:

No-Priority, Post-Auth Vulnerabilities

In the course of collecting and disclosing vulnerabilities, I occasionally come across an issue that walks like a vuln, quacks like a vuln, but... it's not exactly a vuln. The behavior observed is nearly always a bug of some sort, but it’s not immediately exploitable, or the “exploit” is merely exercising the expected level of privilege, but in an unexpected context.


Identify Yourself

When you share this information, your friends will want to know who it is coming from. Please enter your name and email address in the boxes below.