Disclosures
Public and privately disclosed security findings from my pre-AI career. Most of this work is eight to fifteen years old — kept here as a record of how I think, not as a service offering.
2022
-
National Vulnerability Database — coordinated error correction
Coordinated with NIST to identify and correct thousands of errors in the National Vulnerability Database. Downstream scanners got more trustworthy.
-
Microsoft Bug Bounty — $3,000 award
Public recognition and a $3,000 award from Microsoft for a private vulnerability disclosure.
-
Log4Shell Detection Tool
Open-sourced a Log4j detection tool with 90% lower resource use, 99% faster runtime, and zero false positives vs. incumbent scanners. Picked up by 150+ companies during the Log4Shell response.
2021
-
Windows PowerShell Core and Windows Defender Application Control
Privately disclosed several major vulnerabilities in Microsoft PowerShell Core and Windows Defender Application Control (WDAC). One of these became publicly documented as VULN-051861.
-
IBM BigFix — multiple vulnerabilities
Privately disclosed several major vulnerabilities in IBM BigFix during the Verve Industrial Protection period. Subsequent public CVEs grew out of earlier work on the same product family.
2017
-
IBM BigFix — CVE-2017-1466
IBM BigFix advisory. Public details were embargoed at time of original disclosure.
-
IBM BigFix — CVE-2017-1222
IBM BigFix Platform did not perform authentication checks for a critical resource, allowing anonymous users access to protected areas.
2015
-
IBM BigFix — CVE-2016-0214
Unauthenticated file upload vulnerability in the IBM BigFix platform, permitting denial of service and the hosting of phishing pages via management infrastructure.
-
UW-Madison AANTS — network infrastructure vulnerability chain
Chain of vulnerabilities that, when combined, would have let a remote unauthenticated attacker manipulate all managed switches, routers, and firewalls on the UW campus network. Privately disclosed and remediated.
If you're researching a specific advisory and need more detail than what's here, email me at bill@strawgate.com. For active vulnerability reports in any of my current open-source projects (FastMCP, py-key-value, py-mcp-collection), please use GitHub security advisories rather than public issues.