Real Name | Muhammad Shahbaz |
---|---|
Email address | private |
First Active | 2018-11-08 |
Last Active | 2019-05-14 |
Telenor.com.pk appears to allow an attacker set an arbitrary phone number for receiving an SMS for the second factor of authentication.
8604c3f0d31b2d0576055c5284067328ab79783fa81ecaea6f9791cb7d2f0d4f
Everus.org Mobile Wallet version 1.0.9 suffers from an information disclosure vulnerability.
5e10c32d266a1fb94f1982b3ab04a73cc98bd67360ad1e4d737e8200a557f3f4
The Everus.org Android application version 1.0.9 has a fundamental design flaw where the client can send a random phone number during the second factor flow with an arbitrary existing user id and the server send the attacker the one time password for the other user.
e46c0f54b8cf03d1272fe5737ef712ce4a51f293453a2cc14d9e32c21776b79e
The Everus.org Android application version1.0.7 has a fundamental design flaw where the server provides the second factor to the client for comparison instead of properly validating it server-side.
6692defba0408aaffe64bbe95bc5c8092936c9174bf5aeb6c6109750fc09bd4f
The Everus.org Android application version 1.0.7 has a fundamental design flaw where the client can send a random phone number during the second factor flow and the server will update the number on file.
3e9b959514c847660438e492cbbb319db2e0dc6f0abcfbbafa4b0393521c2cac