opkmountain.blogg.se

Icq download redirectis to mail.ru
Icq download redirectis to mail.ru







icq download redirectis to mail.ru

This is due to lack of setting the Hardened Runtime capability in XCODEĬleartext storage of API keys & tokens. MacOS client is vulnerable to low-privilege attacker injecting code into the application using dylib. No exploit.ĬSRF token with 24h lifetime, leading to possibility of connecting attackers paypal with victims shopify account SSRF that could have lead to compromise of server and significant data breach SQLi allowing for access to data on Thai server. SQLi through get parameter allowed for data exfiltration from Thai users. SQLi through multiple parameters, but in unused service. Unauthenticated API allowed an attacker to change hostname of device Overwrite data as low privilege user, by renaming existing folder to the name of a folder you do not have access to Using PDF-generator and an iframe, one could export the PDF with arbritrary file content No validation that user rated his own trips, meaning drivers could alter their ratings. PHP injection through unserialize() leading to code executionĭangling AWS Record allowed zone transfer, leading to access to cookies and CORS, which could facilitate phishing attacks Leaking order information due to IDOR (No PII, only bought items) Negative values allowed for price parameters allowed for free goods IDOR allows enumeration of users with connected google analytics or the amount of calendars owned by a single user View webcam and run code in context of any webpage in Safari Takeover any shopify store by registering email, sending email verification request, changing email and confirming request chainĪbusing relative paths to run custom scripts during startup Same as below, but change of email HAS to be completed before receiving the email verification request. Unauthenticated API allows enumeration of user names & phone numbersĪuth bypass allowing access to support tickets Unauthenticated API endpoint leaking holiday schedule of employees in ChinaĪllows merging victims store to attackers account Brute force account takeover via recovery codeĪbusing backup and restore function to escalate privilegesĪrbritrary file deletion + DLL Hijacking leads to privilege escalation during install









Icq download redirectis to mail.ru