Mehmet Ince @mdisec – Vulnerability Researcher | Building security products | Security Advisor | Amateur Muay Thai fighter
  • Posts
  • Disclosed CVEs
  • About Me
  • X
  • LinkedIn
  • YouTube
  • GitHub

0day advisory authentication cve cyber django exploit hacking logpoint metasploit middleware product security vulnerability

  • The Story of a Perfect Exploit Chain: Six Bugs That Looked Harmless Until They Became Pre-Auth RCE in a Security Appliance
    Jan 1, 2026

    The Story of a Perfect Exploit Chain: Six Bugs That Looked Harmless Until They Became Pre-Auth RCE in a Security Appliance

    It was May 2024, and our internal security team was evaluating the LogPoint SIEM/SOAR platform to replace our existing platform, potentially. As part of a habit I’ve built over the years —and honestly, part of our 3rd party due diligence— I gave myself 24 hours to do what I always do with any technology we’re about to trust: try to break it.

    Those 24 hours were enough to uncover three serious vulnerabilities almost immediately. Given their impact, I stopped there and proceeded directly to responsible disclosure.

    Months later, with time finally on my side, I came back not to look for more bugs but to better understand the system. That second look revealed something far more interesting: how small, seemingly independent 6 bugs could coalesce into a much larger problem.

    This article tells that story. It follows a hacker human’s reasoning as it navigates unfamiliar code, undocumented behavior, and assumptions never meant to be tested. Along the way, it includes wrong turns and dead ends, but also the moments where something subtle feels off and careful inspection turns that feeling into a concrete finding.

    I hope you’ll enjoy the journey as much as I did. Happy New Year to everyone 🎊🥳

    Read the story
  • Inside PostHog: How SSRF, a ClickHouse SQL Escaping 0day, and Default PostgreSQL Credentials Formed an RCE Chain (ZDI-25-099, ZDI-25-097, ZDI-25-096)
    Dec 15, 2025

    Inside PostHog: How SSRF, a ClickHouse SQL Escaping 0day, and Default PostgreSQL Credentials Formed an RCE Chain (ZDI-25-099, ZDI-25-097, ZDI-25-096)

    It was yet another day at the office. Our team was internally discussing moving to a different platform analytics solution. Our team was really leaning more towards Posthog. It’s one of the brilliant -I personally believe it’s the best- products on the market. And that’s where the story has begun…

    (more…)
  • The Chessboard of Security: Insights on Product Development and Vulnerabilities from a Hacker Perspective
    Nov 7, 2025

    The Chessboard of Security: Insights on Product Development and Vulnerabilities from a Hacker Perspective

    I was playing a quick game of chess while waiting for my coffee this morning. I had the white pieces and, as always, was eager to make the most of my first-move advantage. Early in the game, I pushed a center pawn forward aggressively, hoping to gain more control of the board. But soon, I realized that this overextended pawn is going to be vulnerable! To protect it, I had to pull my knight back, sacrificing some of my momentum. Despite having the upper hand initially, I ended up settling for a draw.

    (more…)
  • Digital Cosmos: A Journey Through the Galaxy of Vulnerabilities
    Oct 7, 2025

    Digital Cosmos: A Journey Through the Galaxy of Vulnerabilities

    Whenever I ponder the vastness of space and our limited ability to observe only the Milky Way, I am utterly fascinated. It took us thirty years to position the James Webb Telescope at the Lagrange point (L2), offering us a mere glimpse into events that unfolded millions of years ago.

    (more…)
  • CVE-2021-3825 | LiderAhenk 0day – All your PARDUS Clients Belongs To Me
    Dec 21, 2021

    CVE-2021-3825 | LiderAhenk 0day – All your PARDUS Clients Belongs To Me

    LiderAhenk is an open source software system that enables centralized management, monitoring and control of systems and users on the corporate network.

    In this blog post, you will see how bad it can get when you have a critical security vulnerability on your centralized client management system.

    (more…)
  • CVE-2021-3806 | Pardus 21 Linux Distro – Remote Code Execution 0day
    Sep 13, 2021

    CVE-2021-3806 | Pardus 21 Linux Distro – Remote Code Execution 0day

    A couple of days ago, I came up with news that Pardus will organize a report-bug contest. I love to contribute to open-source projects. So that was a pretty good chance to revisit one of my old friends, Pardus, and uncover security and/or privacy issues.

    (more…)
  • CVE-2021-21425 | Unexpected Journey #7 – GravCMS Unauthenticated Arbitrary YAML Write/Update leads to Code Execution
    Mar 21, 2021

    CVE-2021-21425 | Unexpected Journey #7 – GravCMS Unauthenticated Arbitrary YAML Write/Update leads to Code Execution

    It has been a while since I haven’t published a post on our beloved blog. Today I would like to share technical details and POC for a pretty funny vulnerability that I’ve found at GravCMS.

    (more…)
  • Vesta Control Panel Second Order Remote Code Execution 0day Step-by-Step Analysis
    Mar 18, 2020

    Vesta Control Panel Second Order Remote Code Execution 0day Step-by-Step Analysis

    I believe that doing a security research is all about trying to understand high-level of architecture of the products and finding a creative attack vectors.

    I hope this blog post will show some the readers how to start doing security research.

    (more…)
  • Why Secure Design Matters ? Secure Approach to Session Validation on Modern Frameworks (Django Solution)
    Sep 8, 2019

    Why Secure Design Matters ? Secure Approach to Session Validation on Modern Frameworks (Django Solution)

    I’ve been doing security researches on softwares for a quite long time. During these researchs, I often find myself in a situation where in I think about the state of mind of developers, problems that occur during developments and core problems of nature of software crafting teams. Thinking about these questions always lead me to realize possible software bugs.

    (more…)
  • CVE-2018-20323 | MailCleaner Community Edition Remote Code Execution
    Dec 19, 2018

    CVE-2018-20323 | MailCleaner Community Edition Remote Code Execution

    In this article, I would like to share a remote code execution vulnerability details of MailCleaner Community Edition product.

    (more…)
1 2 3
→
  • Posts
  • Disclosed CVEs
  • About Me