Kevin J. — Co-Founder
Technical with a strong foundation in software & security engineering. These are some of my publicly acknowledged contributions to improving the security of widely used software impacting millions of users. Public vulnerabilities discovered by me: CVE-2025-59922 - Fortinet Forticlient EMS RCE CVE-2025-11208 - Google Chrome (And all other chromium related browsers) CVE-2025-32017 - Umbraco Authenticated RCE CVE-2024-31963 - Mitel RCE CVE-2024-31964 - Mitel CVE-2024-31965 - Mitel CVE-2024-31966 - Mitel CVE-2024-31967 - Mitel CVE-2023-31448 - PRTG Path Traversal CVE-2023-31449 - PRTG Path Traversal CVE-2023-31450 - PRTG Path Traversal CVE-2023-31451 - PRTG File Disclosure with Regex CVE-2023-31452 - PRTG CSRF CVE-2023-32781 - PRTG RCE CVE-2023-32782 - PRTG RCE CVE-2023-24037 - Nagios CVE-2023-24036 - Nagios (Auth Bypass) CVE-2023-24035 - Nagios CVE-2023-24034 - Nagios CVE-2022-38165 - F-Secure Policy Manager (Unauthed arbitrary filewrite) CVE-2022-38162 - F-Secure Policy Manager CVE-2022-28885 - F-Secure Policy Manager CVE-2022-45871 - WithSecure fsicapd CVE-2020-12480 - Play Framework (Global CSRF Bypass) CVE-2020-XXXX - BTCPay (XSS to leaked private key) CVE-2019-XXXX - Cerberus FTP (XSS to RCE) CVE-2019-XXXXX/fsc-2019-3 - F-secure Internet Gatekeeper (RCE) CVE-2019-XXXXX/fsc-2019-4 - F-secure Server Security (RCE) CVE-2018-9191 - Fortinet FortiClient (LPE) CVE-2018-9193 - Fortinet FortiClient (LPE) Besides that I have +300 confirmed bugbounty reports mostly in web security. Talks: Introduction to exploiting embedded devices - https://vimeo.com/1070786516 Harnessing zero-days in assume breach testing - https://vimeo.com/1063883979 Blogposts: https://blog.secu.dk/blog/Tunnels_in_a_hard_filtered_network/ (use google cache) https://blog.secu.dk/blog/hitcon/ (use google cache) https://blog.secu.dk/blog/Forticlient/ (use google cache) https://blog.doyensec.com/2020/02/03/heap-exploit.html https://blog.doyensec.com/2020/08/20/playframework-csrf-bypass.html https://baldur.dk/research.html <- most recent research
Stackforce AI infers this person is a highly skilled security consultant specializing in application security and vulnerability research.
Location: Copenhagen, Capital Region, Denmark
Experience: 11 yrs
Skills
- Application Security
- Information Security
- Software Development
- Security Controls
Career Highlights
- Discovered multiple CVEs impacting major software.
- Over 300 confirmed bug bounty reports.
- Expert in application security and vulnerability research.
Work Experience
Pleo
Senior Application Security Engineer (11 mos)
Baldur.
Principal Security Consultant & Founder (2 yrs 5 mos)
CSIS Security Group A/S
Principal Security Consultant (1 yr 1 mo)
Corporate Funding Partner
CTO (2 yrs 2 mos)
Doyensec
Security Researcher (1 yr)
Secu A/S
Security Consultant (4 yrs 4 mos)