Skip to main content

Questions tagged [vulnerability]

A weakness or flaw in computer software and hardware which allows an attacker to take advantage of (exploit) a targeted system.

Filter by
Sorted by
Tagged with
19 votes
8 answers
3k views

I am writing a book, and in it, a character has hacked an employee database. They want to do two things: read and write. They want to see all the employees, but they also want to insert a new employee ...
user110391's user avatar
-2 votes
0 answers
39 views

I encountered privilege escalation modules while preparing for Certified Ethical Hacker Exam, but the exam material is often shallow. Most resources like Pass4Future give high-level explanations in ...
tonybode2345's user avatar
1 vote
0 answers
55 views

I have an application, myapplication.exe. Through IFEO registry I can attach a debugger, which can be a malicious piece of software for a attacker. Only someone having access to Windows registry can ...
Jyothish Bhaskaran's user avatar
0 votes
1 answer
68 views

In one bug bounty program, when I tried to send HTTP request where the path ended with character (%) like the following example: GET /resources/% HTTP/2 Host: www.example.com Content-Length: 160 ...
Shady's user avatar
  • 3
1 vote
0 answers
102 views

I’m trying to understand the privacy implications of iCloud’s Advanced Data Protection (ADP), Hardware Security Module (HSM) keys, and permanently deleted data. My concern is that, from a user's ...
adguard's user avatar
  • 11
0 votes
1 answer
180 views

I want to have a definitive understanding of the terms risk assessment and threat modelling. I read different articles, but I still can't grasp the difference. How do I know which exercise I should do?...
anonymous's user avatar
  • 559
1 vote
0 answers
50 views

I'm trying to understand how in glibc 2.3.5 arena_get function (called by public_mALLOc) will return the arena_key in house of prime exploit, where the arena_key is first overridden to the value of ...
danielsa5's user avatar
-2 votes
1 answer
148 views

I want to write down as a security requirements, the recommended security configurations that should be applied to any xml parser. I checked the OWASP cheatsheet (https://cheatsheetseries.owasp.org/...
anonymous's user avatar
  • 559
15 votes
2 answers
5k views

I got a Dynamic Application Security Testing (DAST) scan that reports an issue on a web application. It says "The web application contains a link to a non-existing domain" and it's marked ...
anonymous's user avatar
  • 559
1 vote
1 answer
197 views

Two weeks ago (Feb 25, 2025), CISA added CVE-2024-49035 to its catalog of actively exploited vulnerabilities. Now, the thing is: CVE-2024-49035 is not a "classic" vulnerability in a software ...
Heinzi's user avatar
  • 3,960
1 vote
0 answers
285 views

I have identified an XXE vulnerability in an XML parser of an application that allows external entities. I used the below crafted xml to do a get request on localhost on port 9090, and on the same ...
anonymous's user avatar
  • 559
12 votes
10 answers
2k views

We are facing a challenge with managing vulnerabilities in certain open-source libraries used in our enterprise product. The current versions of these libraries have known vulnerabilities flagged by ...
Harsh Choudhary's user avatar
5 votes
3 answers
2k views

Scenario: A web server with a web app for remote staff. The web server is behind a reverse proxy (traefik) The web server has a host based firewall configured to allow connections only from the proxy ...
IamNaN's user avatar
  • 802
3 votes
1 answer
150 views

I am looking at this CVE: https://nvd.nist.gov/vuln/detail/CVE-2021-22044 The description says: In Spring Cloud OpenFeign 3.0.0 to 3.0.4, 2.2.0.RELEASE to 2.2.9.RELEASE, and older unsupported ...
anonymous's user avatar
  • 559
0 votes
0 answers
94 views

Does anyone know any type of vulnerability that affects CPU registers that allows an attacker overwrite registers with specific values that remain fixed for example for a few instructions and only ...
19216811's user avatar

15 30 50 per page
1
2 3 4 5
71