vulnerabilities

  1. Carding

    Vulnerabilities in Juniper, ASUS, D-Link, Tenda, and NETGEAR network devices

    Several dangerous vulnerabilities in network devices that allow you to execute your own code or gain control access without passing authentication: A vulnerability (CVE-2023-36845) has been identified in Juniper SRX series firewalls and Juniper EX series switches built on the basis of Junos OS...
  2. Carding

    Disgusting eight: CISA joins the list of actively exploited vulnerabilities

    8 well-forgotten vulnerabilities continue to be used in real attacks. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added eight new items to its catalog of known exploited vulnerabilities. The decision to add it was made based on data about the active exploitation of...
  3. Carding

    Rating of the 20 most exploited vulnerabilities

    Qualys has published a ranking of the vulnerabilities most commonly used to launch attacks and spread malware or ransomware. 15 of the vulnerabilities presented in the rating affect Microsoft products. Resulting rating: 1. CVE-2017-11882: Memory corruption in Microsoft Office that allows code...
  4. Mutt

    Vulnerabilities Android

    Android OS in a short period of time has become one of the most popular systems for all kinds of mobile devices. It is used by both large world-renowned manufacturers and small companies, so the price range of finished products, such as smartphones and tablet computers, can satisfy the needs of...
  5. Mutt

    What Vulnerabilities Are There For Web Applications?

    ◾️ Injection:? Includes vulnerabilities such as SQL injection, OS command and SMTP injection, and other vulnerabilities where the attacker can inject custom commands into interpreters and the like. ◾️ Broken Authentication:? Whoever has users must be able to identify them. This is called...
  6. CreedX

    Vulnerabilities of iPhones

    Apple is actively introducing to the masses the idea that now, with the privacy of the data of users of their products, everything is in order. But researchers at Hexway have found that the standard and widely used Bluetooth LE (BLE) mechanism allows you to learn quite a lot about your iPhone...
  7. Carding

    Software vulnerabilities

    Software vulnerabilities are errors made by programmers during the software development phase. They allow attackers to gain illegal access to program functions or data stored in it. Flaws can appear at any stage of the life cycle, from design to release of the finished product. In some cases...
Top