Attacking Soft Tokens - Advanced Reverse Engineering on Android

Traditional hardware 2FA tokens are increasingly being replaced by “soft” tokens – software OTP generators packaged into regular smartphone apps that run on iOS or Android. This is more convenient ...

Attacking BYOD Enterprise Solutions

Enterprise Mobile Security (EMS) is a component of BYOD solutions that promises data, device and communications security for enterprises. Amongst others, it aims to solve Data Loss (via DLP), Netwo...

Exploiting Buffer Overflows on MIPS Architectures

In this paper Lyon Yang walks the reader through the process of writing a code execution exploit for a MIPS device. Tricks described in the paper include dealing with cache incoherencies on MIPS an...

VP2016-001 File Replication Pro Remote Command Execution

File Replication Pro (FRP)  is a file management solution that is used to back up and copy files from various nodes in the network. Vantage Point has discovered multiple vulnerabilities in FRP v7.2...

VP2015-003 ZHONE Router Multiple Remote Code Execution Vulnerabilities

ZHONE RGW is vulnerable to stack-based buffer overflow attacks due to the use of unsafe string functions without sufficient input validation in the httpd binary. Two exploitable conditions were dis...

VP2015-002 ZHONE Router Multiple Vulnerabilities

ZHONE RGW is vulnerable to stack-based buffer overflow attacks due to the use of unsafe string functions without sufficient input validation in the httpd binary. Two exploitable conditions were dis...

VP2014-002 Cisco Unified Communications Manager Multiple Vulnerabilities

Cisco Unified Communications Manager (CUCM) offers services such as session management, voice, video, messaging, mobility, and web conferencing. During the last year, Vantage Point Security has rep...

VP-2014-007 Remote Command Injection in Symantec Encryption Gateway

Symantec Gateway Email Encryption provides centrally managed email encryption to secure email communications with customers and partners regardless of whether or not recipients have their own email...

VP-2014-004 SysAid Server Arbitrary File Disclosure

SysAid Server is vulnerable to an unauthenticated file disclosure attack that allows an anonymous attacker to read arbitrary files on the system. An attacker exploiting this issue can compromise Sy...