Author Archives: Qazi Ashfaq

VAPT: Web Application VAPT

TEST11

Description:
It is observed to application is vulnerable to code injection attack.

 

Vulnerability Assessment Steps:
Step 1:

These types of Commets in bold and image should be in border

Step 2:

These types of Commets in bold and image should be in border

 

 

Exploit Description:
Test

 

Exploit Steps
Step 1:  

Screenshot add with comments

Figure comments  :

Step 2:

Screenshot add with comments

 

Figure comments :

 

Impact:
No screenshot require

Here impact in bullets and numbering

Countermeasures:
The following prevention of Code injection attack are given below:

 

 

Countermeasures Steps:
Step 1:  

Screenshot add with comments

Figure comments  :

Step 2:

Screenshot add with comments

 

Figure comments :

 

Reference:
www.hackdossier.com

TEST1

AMD Acknowledges Newly Disclosed Flaws In Its Processors — Patches Coming Soon

amd-processor-vulnerabilities

AMD has finally acknowledged 13 critical vulnerabilities, and exploitable backdoors in its Ryzen and EPYC processors disclosed earlier this month by Israel-based CTS Labs and promised to roll out firmware patches for millions of affected devices ‘in the coming weeks.’

According to CTS-Labs researchers, critical vulnerabilities (RyzenFall, MasterKey, Fallout, and Chimera) that affect AMD’s Platform Security Processor (PSP) could allow attackers to access sensitive data, install persistent malware inside the chip, and gain full access to the compromised systems.