exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files from Rubén López Herrera

First Active2024-09-12
Last Active2024-09-12
3DSecure 2.0 3DS Authorization Method Cross Site Request Forgery
Posted Sep 12, 2024
Authored by Rubén López Herrera

A cross site request forgery vulnerability was identified in the Authorization Method of 3DSecure version 2.0, allowing attackers to submit unauthorized form data by modifying the HTTP Origin and Referer headers.

tags | exploit, web, csrf
advisories | CVE-2024-25286
SHA-256 | 032e3a53c89b7b4a7b7b3de30de850a84f091eca55d4270ee219cc8a08689f23
3DSecure 2.0 3DS Method Authentication Cross Site Scripting
Posted Sep 12, 2024
Authored by Rubén López Herrera

3DSecure version 2.0 is vulnerable to form action hijacking via the threeDSMethodNotificationURL parameter. This flaw allows attackers to change the destination website for form submissions, enabling data theft.

tags | exploit, xss
advisories | CVE-2024-25285
SHA-256 | dc98bb08a58bbfec1100b0b81febe49fd09487b8a8456933f842f161ab0d5757
3DSecure 2.0 3DS Authorization Method Cross Site Scripting
Posted Sep 12, 2024
Authored by Rubén López Herrera

Multiple reflected cross site scripting vulnerabilities in the 3DS Authorization Method of 3DSecure version 2.0 allow attackers to inject arbitrary web scripts via the threeDSMethodData parameter.

tags | exploit, web, arbitrary, vulnerability, xss
advisories | CVE-2024-25284
SHA-256 | 6d39badeee9ca588e282577f02ef7077faa513c136944eec8da9e5f0a73a67a8
3DSecure 2.0 3DS Authorization Challenge Cross Site Scripting
Posted Sep 12, 2024
Authored by Rubén López Herrera

Multiple reflected cross site scripting vulnerabilities exist in the 3DS Authorization Challenge of 3DSecure version 2.0. These flaws allow attackers to inject arbitrary web scripts, CSS, or HTML through the manipulation of the params parameter in the request URL.

tags | exploit, web, arbitrary, vulnerability, xss
advisories | CVE-2024-25283
SHA-256 | 5c49c8e7ecdf6ea8c0ca9ef4838d0136aa0e0903e7e668c089948442cca4d4d4
3DSecure 2.0 3DS Method Authentication Cross Site Scripting
Posted Sep 12, 2024
Authored by Rubén López Herrera

3DSecure version 2.0 is vulnerable to cross site scripting in its 3DSMethod Authentication. This vulnerability allows remote attackers to hijack the form action and change the destination website via the params parameter, which is base64 encoded and improperly sanitized.

tags | exploit, remote, xss
advisories | CVE-2024-25282
SHA-256 | 17cd30a43cadf4e0ba472bc1f4cadd560c5b65235a04affcc4271b43c4dc6065
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close