Editing Vulnerabilities
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
== | D=== VidNow === | ||
A possible exploit has been found in VidNow App in the Playstation Store App . | |||
PATCHED: Sony has hotfixed this exploit via content hashing the file while in transit. | |||
UPDATE: Some have managed to reverse the hotfix but the method is not known - the PS4 checks the content | |||
hash HTTP header from the HMAC header. | |||
== Patched == | |||
=== WebKit === | |||
[[Internet_Browser#Webkit_exploit|WebKit/536.26 exploit]] on [[System Firmware]] [[1.760.000]] and lower (patched in [[2.000.000]]) | |||
http://wololo.net/2014/10/24/webkit-exploit-confirmed-to-run-on-ps4-firmware-1-76/ | |||
{{Reverse Engineering}} | {{Reverse Engineering}} | ||
<noinclude> | <noinclude>[[Category:Main]]</noinclude> | ||
[[Category:Main]] | |||
</noinclude> |