User:Antonfuller/sandbox

Dhiraj Mishra is a Dubai-based ethical hacker. He started his career as a security analyst in Ernst & Young in 2016.

Telegram (software) awarded him US$2700 as bounty for allowing users to recover photos and videos “unsent” by other people. He also received US$2700 from Telegram (software) which leaks IP address during peer to peer call. Mishra discovered Same origin policy (SOP) bypass issue that resides in the popular Samsung Internet Browser that could allow an attacker to steal data from browser tabs if the user visits an attacker-controlled site.

He also found a vulnerability in Evernote that could have allowed an attacker to run malicious commands on any macOS computer with Evernote installed.

He also disclosed an unpatched vulnerability in smart TVs would allow attackers on the same Wi-Fi network to hijack the TV set to broadcast their own content – including, potentially, fake emergency broadcast messages.

Mishra completed his schooling in Mumbai, Maharashtra. In 2013, He graduated in information technology from University of Mumbai.