Skip to main content

Questions tagged [vulnerability]

A weakness or flaw in computer software and hardware which allows an attacker to take advantage of (exploit) a targeted system.

1 vote
0 answers
45 views

I have an application, myapplication.exe. Through IFEO registry I can attach a debugger, which can be a malicious piece of software for a attacker. Only someone having access to Windows registry can ...
Jyothish Bhaskaran's user avatar
1 vote
0 answers
93 views

I’m trying to understand the privacy implications of iCloud’s Advanced Data Protection (ADP), Hardware Security Module (HSM) keys, and permanently deleted data. My concern is that, from a user's ...
adguard's user avatar
  • 11
1 vote
0 answers
47 views

I'm trying to understand how in glibc 2.3.5 arena_get function (called by public_mALLOc) will return the arena_key in house of prime exploit, where the arena_key is first overridden to the value of ...
danielsa5's user avatar
15 votes
2 answers
5k views

I got a Dynamic Application Security Testing (DAST) scan that reports an issue on a web application. It says "The web application contains a link to a non-existing domain" and it's marked ...
anonymous's user avatar
  • 559
1 vote
0 answers
277 views

I have identified an XXE vulnerability in an XML parser of an application that allows external entities. I used the below crafted xml to do a get request on localhost on port 9090, and on the same ...
anonymous's user avatar
  • 559
5 votes
3 answers
2k views

Scenario: A web server with a web app for remote staff. The web server is behind a reverse proxy (traefik) The web server has a host based firewall configured to allow connections only from the proxy ...
IamNaN's user avatar
  • 802
0 votes
0 answers
91 views

Does anyone know any type of vulnerability that affects CPU registers that allows an attacker overwrite registers with specific values that remain fixed for example for a few instructions and only ...
19216811's user avatar
1 vote
0 answers
77 views

Many large companies have IT policies where even low-level IT employees have privileges such as remote access to any company computer (often automatic, able to override user denial, or even silent), ...
Obie 2.0's user avatar
  • 111

15 30 50 per page
1
2 3 4 5
71