vulnerability

  1. Carding

    Hackers with a time machine actively use the fixed Adobe ColdFusion vulnerability

    Experts assessed the breach as critical and recommended an urgent update of the vulnerable software. The US Cybersecurity Agency (CISA) has added a vulnerability with the identifier CVE-2023-26359 to the catalog of known vulnerabilities used. Experts gave it a severity rating of 9.8 out of 10...
  2. Tomcat

    Carders rob PayPal wallets through unknown vulnerability

    Cybercriminals have discovered a vulnerability in the integration of PayPal with Google Pay and are actively exploiting it for illegal money transfers. Starting on February 21 of this year, users began to notice unknown transactions in their PayPal payment histories made through Google Pay. User...
  3. Tomcat

    4G LTE vulnerability allows pretending to be any device on the mobile network

    A joint team of researchers from the Ruhr and New York Universities has developed a new attack method that allows you to impersonate a legitimate user on a mobile network. The technique, dubbed IMP4GT (IMPersonation Attacks in 4G NeTworks), exploits a vulnerability in 4G LTE, namely the lack of...
  4. Tomcat

    Vulnerability allows attackers to eavesdrop and intercept VPN connections

    Researchers at the University of New Mexico have discovered a vulnerability affecting Ubuntu, Fedora, Debian, FreeBSD, OpenBSD, macOS, iOS Android, and other Unix-based operating systems. The problem allows you to eavesdrop, intercept and interfere with the operation of VPN connections. The...
  5. Lord777

    Vulnerability in iPhone that breaks the system instantly

    If the iPhone is connected to a Wi-Fi network named "%p%s%s%s%s%n" then it will RiP. The bug can only be fixed by completely resetting the network settings. This can be done in the Settings -> General -> Reset -> Reset network settings menu. There is another way: The problem this time arises...
  6. Hacker

    Vulnerability CVE-2021-3019

    Represents a Directory Traversal vulnerability Allows to traverse the Ffay directory in lanproxy and read configuration files. Interestingly, the vulnerability was discovered on January 4-5, 2021 and was assigned a medium severity class. At the moment, the hazard class has been increased...
  7. Mutt

    WhatsApp vulnerability

    Gal Weizman, an information security researcher, described the technical details of the High Grade Vulnerability (CVE-2019-18426) on WhatsApp. They allowed attackers to read files from Windows and macOS PCs and execute arbitrary code. The vulnerabilities are now fixed by the developer. The...
  8. Hacker

    Vulnerability purchase and sale market

    Obverse side of the medal Bug, hole, vulnerability, split - oh, these words are so cute to the hacker heart! However, it turns out that they are not only nice to hackers, testers and others like them - there are also people who earn a lot of money from these very holes. First, let me tell you...
  9. Lord777

    How the vulnerability in Microsoft Exchange Server works and how hackers use it

    There are no invulnerable programs - this truth is known to everyone. But when attackers find zero‑day vulnerabilities in some software, the fun begins: both for users and for developers who have to fix the detected gaps in an emergency mode. And if this happens with very popular and widely...
Top