Forums before death by AOL, social media and spammers... "We can't have nice things"
|    comp.mobile.android    |    Discussion about Android-based devices    |    236,147 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 234,304 of 236,147    |
|    Marion to Tyrone    |
|    Re: What do folks make of this zero-day     |
|    29 Sep 25 12:32:18    |
      XPost: comp.sys.mac.advocacy, misc.phone.mobile.iphone       From: marionf@fact.com              Tyrone wrote:       > As a result, *Android devices tend to be more susceptible to malware              Tyrone,              You are likely one of the few people on this newsgroup who knows       anything about other platforms, such as about Windows PowerShell.              So I ask you to look at the scripts I provided to Steve & Chris.        a. kev.bat        b. kev.ps1       Run them.              Apple locked you behind a barbed-wired fenced prison because Apple "said"       it was for your "security", and yet, nobody can find that security you paid       so dearly for. If that "security" exists, then why are there so many bugs?              Here are the numbers I'm asking the adults on this newsgroup to ponder:        Running on platform: Windows PowerShell        PowerShell version: 5.1.19041.6328        Downloaded fresh file: C:\data\sys\batch\cisa\kev.csv        Estimated Apple-related exploits: 106        Estimated Android-related exploits: 110        Estimated shared exploits: 20        Press any key to continue . . .              For auditing, that also produces the following log files:        android_matches_20250929_055357.log        ios_matches_20250929_055357.log        shared_matches_20250929_055357.log              Here are just the first five lines of each of those log files:        android_matches_20250929_055357.log        CVE-2025-10585: google chromium v8 google chromium v8 type confusion       vulnerability        CVE-2025-48543: android runtime android runtime use-after-free vulnerability        CVE-2025-6558: google chromium google chromium angle and gpu improper input       validation vulnerability        CVE-2025-6554: google chromium v8 google chromium v8 type confusion       vulnerability        CVE-2025-5419: google chromium v8 google chromium v8 out-of-bounds read and       write vulnerability               ios_matches_20250929_055357.log        CVE-2025-43300: apple ios, ipados, and macos apple ios, ipados, and macos       out-of-bounds write vulnerability        CVE-2019-6693: fortinet fortios fortinet fortios use of hard-coded       credentials vulnerability        CVE-2025-2783: google chromium mojo google chromium mojo sandbox escape       vulnerability        CVE-2025-24472: fortinet fortios and fortiproxy fortinet fortios and       fortiproxy authentication bypass vulnerability        CVE-2025-24200: apple ios and ipados apple ios and ipados incorrect       authorization vulnerability               shared_matches_20250929_055357.log        CVE-2025-2783: google chromium mojo google chromium mojo sandbox escape       vulnerability        CVE-2016-4657: apple ios apple ios webkit memory corruption vulnerability        CVE-2019-8720: webkitgtk webkitgtk webkitgtk memory corruption vulnerability        CVE-2022-22620: apple ios, ipados, and macos apple ios, ipados, and macos       webkit use-after-free vulnerability        CVE-2021-30762: apple ios apple ios webkit use-after-free vulnerability              Let's work together to know, for sure, what the difference is in exploits.              If you can, please run the scripts I provided on macOS, Linux or Windows.       Let us know the results as we can only make good assessments on good data.              Note: I don't care which platform fares better or worse; I just want the facts.              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca