Category: Articles

CyberArk EPM file block bypass – CVE-2018-14894

Hi folks! My friend Nihat Alp Onaran found an interesting vulnerability on CyberArk Endpoint Privilege Manager. CyberArk EPM file block bypass (CVE-2018-14894) is very easy -even you have slave privileges-.CyberArk EPM aims to manage privileges from one hand and prevent any harm with admin privileges. How does CyberArk EPM work? If user needs admin privileges,…


Fronter XSS – 3 XSS in 1 Blogpost

Today I want to write about Fronter and Fronter XSS Vulnerabilies. Fronter is a learning platform from leading ICT provider, itslearning. Based on Nordic educational models, Fronter is a comprehensive teaching and learning solution used in schools and universities worldwide. As part of the itslearning portfolio, the Fronter solution has a full range of available…


First Touch Games database information leak

Hi everyone in this post I’ll show you how I find out First Touch Games database information. It is actually happens because of a common mistake. Let’s see. FTS is a populer football game which is available on Android and iOS platforms. I dont know why but they are still using very old version of…