vulnerabilities

This Prompt Can Make an AI Chatbot Identify and Extract Personal Details From Your Chats

This Prompt Can Make an AI Chatbot Identify and Extract Personal Details From Your Chats

The researchers say that if the attack were carried out in the real world, people could be socially engineered into believing the unintelligible prompt might do something useful, such as improve their CV. The researchers point to numerous websites that provide people with prompts they can use. They tested the attack by uploading a CV to conversations with chatbots, and it was able to return the personal information contained within the file.Earlence Fernandes, an assistant professor at UCSD who was involved in the work, says the attack approach is fairly complicated as the obfuscated prompt needs to identify personal information,…
Read More
Huge Microsoft Outage Linked to CrowdStrike Takes Down Computers Around the World

Huge Microsoft Outage Linked to CrowdStrike Takes Down Computers Around the World

Banks, airports, TV stations, hotels, and countless other businesses are all facing widespread IT outages, leaving flights grounded and causing widespread disruption, after Windows machines have displayed errors worldwide.In the early hours of Friday, companies in Australia running Microsoft’s Windows operating system started reporting devices showing Blue Screens of Death (BSODs). Shortly after, reports of disruptions started flooding in from around the world, including from the UK, India, Germany, the Netherlands, and the US: TV station Sky News went offline, and US airlines United, Delta, and American Airlines issued a “global ground stop” on all flights.The widespread Windows outages have…
Read More
buffer Overflow (Application Vulnerability)

buffer Overflow (Application Vulnerability)

https://github.com/samglish/bufferOverflow/ In french dépassement de tampon ou débordement de tampon copy data without checking size.A bug whereby a process, when writing to a buffer, writes outside the space allocated to the buffer, thus overwriting information necessary for the process. Most common exploitation stack overflow Injection of a shellcode on the stack and calculation of its address Overflow of a variable on the stack Overwriting SEIP with the shellcode address A C program to demonstrate buffer overflow #include <stdio.h> #include <string.h> #include <stdlib.h> int main(int argc, char *argv[]) { // Reserve 5 byte of buffer plus the terminating NULL. // should…
Read More
No widgets found. Go to Widget page and add the widget in Offcanvas Sidebar Widget Area.