vulnerabilities

  1. Carding 4 Carders

    Innovative fuzzer Cascade discovered 37 vulnerabilities in the RISC-V architecture

    Researchers from the Zurich Institute of Technology left hackers no chance. Scientists from the Swiss Institute of Technology ETH Zurich have developed a new fuzzer for detecting errors in RISC-V chips and using it found more than three dozen flaws. Fuzzing is a technique in which random input...
  2. Carding 4 Carders

    Vulnerabilities in ConnectedIO routers opened hackers access to thousands of companies

    A sent Cossack in other people's networks will collect all the data and not even arouse suspicion. Several high-severity vulnerabilities were found in ConnectedIO ER2000 routers and the corresponding cloud management platform. Threats allow attackers to execute malicious code and gain access to...
  3. CarderPlanet

    Halfway passed: Exim has fixed 3 zero-day vulnerabilities, but you should not relax yet

    Many mail servers are still vulnerable to hacker attacks. The developers of the Exim released fixes for three zero-day vulnerabilities discovered last week as part of the Zero Day Initiative (ZDI) program. One of them allowed attackers to execute code remotely without authentication. The most...
  4. CarderPlanet

    CISA adds a new star to its 'Hollywood' of vulnerabilities

    What else threatens federal systems? CISA has added a new entry to its Catalog of Known Exploited Vulnerabilities. A defect in the Red Hat JBoss RichFaces Framework - CVE-2023-14667, related to expression language injection. Cybercriminals use such flaws quite often, which poses a threat to...
  5. Carding

    Apple responds to threats: Emergency patches for three new zero-day vulnerabilities

    News for those who keep their finger on the pulse. Apple has released emergency security updates to address three new zero-day vulnerabilities that were exploited in attacks on iPhone and Mac users. This year, the company has already fixed 16 such vulnerabilities. Two bugs were found in the...
  6. Carding

    Apple and Google hid details of vulnerabilities: millions of devices at risk

    Critical vulnerabilities in companies systems have put other developers' products at risk. According to a new report from the information security company Rezillion, recent reports from Apple and Google provided incomplete information about critical vulnerabilities that are actively exploited...
  7. Carding

    Vulnerabilities in Juniper, ASUS, D-Link, Tenda, and NETGEAR network devices

    Several dangerous vulnerabilities in network devices that allow you to execute your own code or gain control access without passing authentication: A vulnerability (CVE-2023-36845) has been identified in Juniper SRX series firewalls and Juniper EX series switches built on the basis of Junos OS...
  8. Carding

    Disgusting eight: CISA joins the list of actively exploited vulnerabilities

    8 well-forgotten vulnerabilities continue to be used in real attacks. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added eight new items to its catalog of known exploited vulnerabilities. The decision to add it was made based on data about the active exploitation of...
  9. Carding

    Rating of the 20 most exploited vulnerabilities

    Qualys has published a ranking of the vulnerabilities most commonly used to launch attacks and spread malware or ransomware. 15 of the vulnerabilities presented in the rating affect Microsoft products. Resulting rating: 1. CVE-2017-11882: Memory corruption in Microsoft Office that allows code...
  10. Mutt

    Vulnerabilities Android

    Android OS in a short period of time has become one of the most popular systems for all kinds of mobile devices. It is used by both large world-renowned manufacturers and small companies, so the price range of finished products, such as smartphones and tablet computers, can satisfy the needs of...
  11. Mutt

    What Vulnerabilities Are There For Web Applications?

    ◾️ Injection:? Includes vulnerabilities such as SQL injection, OS command and SMTP injection, and other vulnerabilities where the attacker can inject custom commands into interpreters and the like. ◾️ Broken Authentication:? Whoever has users must be able to identify them. This is called...
  12. CreedX

    Vulnerabilities of iPhones

    Apple is actively introducing to the masses the idea that now, with the privacy of the data of users of their products, everything is in order. But researchers at Hexway have found that the standard and widely used Bluetooth LE (BLE) mechanism allows you to learn quite a lot about your iPhone...
  13. Carding

    Software vulnerabilities

    Software vulnerabilities are errors made by programmers during the software development phase. They allow attackers to gain illegal access to program functions or data stored in it. Flaws can appear at any stage of the life cycle, from design to release of the finished product. In some cases...
Top