CFP Directory LogoCFP Directory
EventsSpeakersTalksOrganizationsFeaturesPricingWhy Us
Sign in

Company

  • About Us
  • Contact

Contact Info

Address:

13, Lorong Toh Aka

Georgetown 10100

Penang, Malaysia

Email:

info@cfp.directory

Website:

13thirtyseven.my

Business Hours

Monday - Friday:9:00 AM - 6:00 PM
Saturday:9:00 AM - 1:00 PM
Sunday:Closed

GMT+8 (Malaysia Standard Time)

© 2025 CFP Directory. All rights reserved.
13 Thirty Seven Sdn. Bhd. (1401538-A)
Privacy PolicyTerms of Service
Back to Speakers
Seokchan Yoon

Seokchan Yoon

Security Researcher at Zellic.io

Seoul,Korea
English

0

Talks Delivered

0

Events Spoken At

0

Countries Visited

1

Years Speaking

0

Total Talks Given

About

## Profile

- Seokchan Yoon (@ch4n3.yoon, @scyoon)

- Security Researcher / CTF Player of BlueWater (WaterPaddler) / [Bug Bounty Hunter](https://hackerone.com/scyoon)

- ch4n3.yoon@gmail.com


## Work Experiences

- **Security Team Member @ Airflow of Apache Software Foundation** (2025.07. - now)

- **Security Researcher @ Zellic.io** (2025.04. - now)

- `[REDACTED]` Researcher @ `[REDACTED]` Research Institute under Ministry of National Defense, Korea (2023.09. - 2025.03.)

- Web Security Researcher @ STEALIEN (2020.07. - 2023.06.)



## Achievements/Awards


### 2025

- **2025 DEF CON 33 CTF**  

 Finalist (team: Cold Fusion)

- **2025 Cyber Conflict Exercise (CCE) General Division**  

 (사이버공격방어대회) Finalist, hosted by the National Intelligence Service, Korea


### 2024

- **2024 White Hat Contest Soldier Division**  

 (화이트햇 콘테스트) **1st Place**, hosted by the Ministry of National Defense, Korea  

 Awarded the Minister of National Defense Award (___국방부 장관상___)


### 2023

- **2023 CODEGATE University Division**  

 Finalist, hosted by the Ministry of Science and ICT, Korea


### 2022

- **2022 CODEGATE University Division**  

 Finalist, hosted by the Ministry of Science and ICT, Korea


- **2022 Cyber Conflict Exercise (CCE) Public Institution Sector Division**  

 (사이버공격방어대회) **2nd Place**, hosted by the National Intelligence Service, Korea  

 Awarded the Director of National Security Research Institute Award (___국가보안연구소장상___)


- **2022 HACKTHEON SEJONG National University Cybersecurity Competition**  

 6th Place, hosted by Sejong Special Self-Governing City, Korea  

 Awarded the Director of National Security Research Institute Award (___국가보안연구소장상___)


### 2021

- **2021 Cyber Conflict Exercise (CCE) Public Institution Sector Division**  

 (사이버공격방어대회) **2nd Place**, hosted by the National Intelligence Service, Korea

 Awarded the Director of National Security Research Institute Award (___국가보안연구소장상___)


### 2019

- **2019 Cyber Operations Challenge Student Division**  

 (사이버작전경연대회) **2nd Place**, hosted by the Ministry of National Defense, Korea  

 Awarded the Cyber Operations Commander Award (___사이버작전사령관상___)


### 2018

- **2018 Cybersecurity Competition Individual Preliminary Round**  

 (정보보안경진대회) **1st Place**, hosted by the Ministry of Education, Korea  

 Awarded the President of Seoul Women's University Award (___서울여자대학교 총장상___)


- **2018 Cybersecurity Competition Team Finals**  

 (정보보안경진대회) **1st Place**, hosted by the Ministry of Education, Korea  

 Awarded the Minister of Education Award (___교육부 장관상___)


### 2017

- **2017 Cybersecurity Competition Team Finals**  

 (정보보안경진대회) **1st Place**, hosted by the Korea Education and Research Information Service  

 Awarded the Director of Korea Education and Research Information Service Award (___한국교육학술정보원장상___)


## Disclosed Vulnerabilities

### NAVER

- NBB-1126, Stored XSS

- NBB-1143, SQL Injection

- NBB-1260, Stored XSS

- NBB-2315, Reflected XSS

- NBB-2316, Reflected XSS

- NBB-2314, Reflected XSS


### Python

- CVE-2024-7592: Quadratic complexity parsing cookies with backslashes


### Django

- CVE-2023-36053: Potential regular expression denial of service vulnerability in `EmailValidator`/`URLValidator`

- CVE-2024-24680: Potential denial-of-service in intcomma template filter

- CVE-2024-27351: Potential regular expression denial-of-service in `django.utils.text.Truncator.words()`

- CVE-2024-21520: Cross-Site Scripting (XSS) in browserable API of [django-rest-framework](https://github.com/encode/django-rest-framework)

- CVE-2024-41991: Potential denial-of-service vulnerability in `django.utils.html.urlize()` and `AdminURLFieldWidget`

- CVE-2024-53908: Potential SQL injection in `HasKey(lhs, rhs)` on Oracle

- CVE-2025-48432: Potential log injection via unescaped request path


### Apache Airflow

- CVE-2024-39877: Apache Airflow: DAG Author Code Execution possibility in `airflow-scheduler`

- CVE-2024-39863: Apache Airflow: Potential XSS Vulnerability

- CVE-2024-45034: Apache Airflow: Authenticated DAG authors could execute code on scheduler nodes


### Ruby 

- CVE-2024-41123: DoS vulnerabilities in REXML


### Ruby on Rails

- CVE-2024-47887: Possible ReDoS vulnerability in HTTP Token authentication in Action Controller

- CVE-2024-41128: Possible ReDoS vulnerability in query parameter filtering in Action Dispatch


### Java Spring

- CVE-2024-38809: Spring Framework DoS via conditional HTTP request


## Media / Presentations

### 2020

- KBS <청년일자리프로젝트 사장님이 美쳤어요> 사내 최연소 연구원으로 출연

  - [https://vod.kbs.co.kr/index.html?source=episode&sname=vod&stype=vod&program_code=T2016-0639&program_id=PS-2020170106-01-000&section_code=05&broadcast_complete_yn=&local_station_code=00](https://vod.kbs.co.kr/index.html?source=episode&sname=vod&stype=vod&program_code=T2016-0639&program_id=PS-2020170106-01-000&section_code=05&broadcast_complete_yn=&local_station_code=00)


### 2021

- 사람인 기업스토리 <스틸리언> 편 출연

  - [https://www.saramin.co.kr/zf_user/guide/movie/fun-view?page=7&keyword=&category=&sort=&seq=433&count=10](https://www.saramin.co.kr/zf_user/guide/movie/fun-view?page=7&keyword=&category=&sort=&seq=433&count=10)

- 유튜브 ‘인싸담당자’ 채널 <스틸리언> 편 출연

  - [https://www.youtube.com/watch?v=ueslFj2Dbgc](https://www.youtube.com/watch?v=ueslFj2Dbgc)


### 2022

- <모던 웹 서비스에서의 버그케이스와 시큐어코딩> (@STEALIEN Security Semiar; 3S)

  - For English Reader, <Bug Cases and Secure Coding Techniques, in Modern Web Services>

  - Related Press Releases (Kor): [https://www.boannews.com/media/view.asp?idx=107983&kind=](https://www.boannews.com/media/view.asp?idx=107983&kind=)

  - Replay: [https://www.youtube.com/watch?v=6YgSTZ9i7Vk](https://www.youtube.com/watch?v=6YgSTZ9i7Vk)


### 2023

- <Django 1-day Vulnerability Analysis> (@HackingCamp 26th 🇰🇷)

  - I analyzed and shared disclosed vulnerabilities with high severity to Django Project, 2022

  - Reference: [http://hackingcamp.org/](http://hackingcamp.org/)

- <Django Framework N-day Vulnerability Analysis & Secure Coding Guide> (@CODEGATE 2023 🇰🇷)

  - I issued some insecure usages in django with analyzing 1-day vulnerabilities and gave secure coding guide 

  - Reference: [https://codegate.org/sub/conference](https://codegate.org/sub/conference)


### 2024

- <해커의 관점에서 바라본 Django Framework> (@PyCon KR 10th)

  - https://2024.pycon.kr/


Connect

Website@@_seokchan_yoon@ch4n3-yoonLinkedIn Profile