Category: Articles

CyberArk EPM file block bypass – CVE-2018-14894

Hi folks! I found an interesting vulnerability on CyberArk Endpoint Privilege Manager. CyberArk EPM file block bypass (CVE-2018-14894) is very easy -even you have slave privileges-.CyberArk EPM aims to manage privileges from one hand and prevent any harm with admin privileges. How does CyberArk EPM work? If user needs admin privileges, CyberArk gives the admin token to…


Fronter XSS – 3 XSS in 1 Blogpost

Today I want to write about Fronter and Fronter XSS Vulnerabilies. Fronter is a learning platform from leading ICT provider, itslearning. Based on Nordic educational models, Fronter is a comprehensive teaching and learning solution used in schools and universities worldwide. As part of the itslearning portfolio, the Fronter solution has a full range of available…


First Touch Games database information leak

Hi everyone in this post I’ll show you how I find out First Touch Games database information. It is actually happens because of a common mistake. Let’s see. FTS is a populer football game which is available on Android and iOS platforms. I dont know why but they are still using very old version of…


-------------------------------------------------------------------------------------------------------------------------Mustafa Kemal Can-------------------------------------------------------------------------------------------------------------------------