Categories Vulnerability

11 posts

Auto Added by WPeMatico

iPhone Passcode Bypass Hack Exposes Contacts And Photos

Flaw in Apple’s iOS 12 allows an attacker to access contacts and photos in iPhone XS model A passcode bypass vulnerability has been discovered in Apple’s new iOS version 12 that could allow an attacker to access photos and contact details on a locked iPhone XS as well as other […]

iTunes’ Wi-Fi Sync Feature Vulnerable To Trustjacking Attack

iOS Trustjacking Attack Allows Hackers To Hack iPhone, iPad Security experts at Symantec have discovered a flaw that if exploited would allow attackers to compromise iOS devices without the owner’s knowledge. The latest iOS attack dubbed as “Trustjacking” exploits a vulnerability in iTunes Wi-Fi Sync, a feature that allows iOS […]

15-Year-Old Finds Vulnerability In Ledger Cryptocurrency Wallet

Ledger’s Nano S Cryptocurrency Wallet Hacked By A 15-Year-Old Teenager Saleem Rashid, a 15-year-old security researcher living in the UK, has discovered a serious vulnerability in Ledger’s hardware crypto-wallets. Ledger, is a French-based company that is famous for their “tamper-proof” hardware wallets made for physical safekeeping of public and private keys used to […]

Google discloses ‘high-severity’ exploit in Windows 10 before it’s patched

Google reveals unpatched security vulnerability in Microsoft’s Edge browser Google’s Project Zero team of security researchers disclosed a “high-severity” vulnerability it found in Microsoft’s Edge browser after the company failed to patch it within the allotted time of 90 days. The vulnerability can allow an attacker to gain administrator privileges if […]

Hunting Insecure Direct Object Reference Vulnerabilities for Fun and Profit (PART-1)

Hello Guys!! This is my first Blog post and i am starting with IDOR Vulnerability. In this Post you will know about many endpoints to test IDOR vulnerability! Hope you will like it. Arbaz Hussain get invitation to test one private program and find vulnerabilities with his team mates but he […]

Web Application Firewall (WAF) Evasion Techniques #2

String concatenation in a Remote Command Execution payload makes you able to bypass firewall rules (Sucuri, ModSecurity) In the and ModSecurity. Probably, reading this code, you’ll think that it’s too much stupid and simple and that no one uses curl inside a system() function instead of using the PHP curl […]

Intel ME Firmware Flaws Not Perfectly Fixed Last Month, Say Security Researchers

Major Intel ME Firmware Flaw Allows Attackers Get ‘God Mode’ On A Vulnerable Machine In a recent presentation held at Black Hat Europe in London, security researchers from Positive Technologies, Mark Ermolov and Maxim Goryachy revealed how a buffer overflow they discovered in the Intel’s secret Management Engine 11’s firmware can be […]

TeamViewer vulnerability allows users sharing a desktop session to gain control of the other’s PC

TeamViewer promptly issues a patch to fix the vulnerability TeamViewer issued a patch for users on Tuesday to fix a vulnerability that allows users sharing a desktop session to gain control of another PC without the latter’s permission. This vulnerability affected versions of TeamViewer running on Windows, macOS and Linux […]

This Facebook Vulnerability Allowed Anyone To Delete Your Photos

Bug in Facebook allowed to delete any photo This just-disclosed Facebook bug would have allowed for anyone with a bit of technical know-how to delete any photo on the social media platform. Discovered by an Iranian web developer, Pouya Darabi earlier this month, the vulnerability resides in Facebook’s new Poll […]