Updates & Blogs

Home / Blog

Discussing about EVMs Machine Hack on 4tv News Channel

Gekza.com CEO, Khaleel Ahmed Khan Discussing about EVMs Machine Hack on 4tv News Channel

December 6, 2017/0/0/
Videos

WhatsApp 2.17.52 – Memory Corruption

December 6, 2017/0/0/

Description: WhatsApp 2.17.52 and prior is prone to a remote memory corruption. This type of attacks are possible if the program uses memory inefficiently and does not impose limits on the amount of state used when necessary. Impact: Resource exhaustion attacks exploit a design deficiency. An attacker could exploit this vulnerability to remotely corrupt the […]

Exploits

Repl.it a browser-based IDE and Compiler

December 6, 2017/0/0/

However, setting up the local runtime environment can be a real pain for beginners. This often requires the command line which is great to learn as you go, but can initially feel like a roadblock. With┬áRepl.it, you can practice coding any compiled language right in your browser from Python to C++ or even Swift for […]

Programming

Forcing viewers to view web content

December 6, 2017/0/0/
gekza exploits

Exploit Author: Amit Sangra Website: cybercriminals.net CVE : CVE-2017-7783 Mozilla Firefox < 55 – Denial of Service If a long user name is used in a username/password combination in a site URL (such as http://UserName:[email protected]), the resulting modal prompt will hang in a non-responsive state or crash, causing a denial of service. # Impact: An […]

Exploits

Apple iOS 10.2 (14C92) – Remote Code Execution

December 6, 2017/0/0/
gekza exploits

The exploit achieves R/W access to the host's physical memory. This exploit has been tested on the iPhone 7, iOS 10.2 (14C92). To run the exploit against different devices or versions, the symbols must be adjusted. The attached archive contains the following directories: -hostapd-2.6 - A modified version of hostapd utilised in the exploit. This [...]

Exploits