Main

processing priority

4

site type

0 (generic, awaiting analysis)

review version

11

html import

20 (imported)

Events

first seen date

2023-10-06 05:56:05

expired found date

-

created at

2024-06-05 03:18:25

updated at

2025-03-28 14:10:13

Domain name statistics

length

12

crc

32386

tld

978

nm parts

0

nm random digits

0

nm rare letters

0

Connections

is subdomain of id

-

previous id

0

replaced with id

0

related id

-

dns primary id

173561409

dns alternative id

0

lifecycle status

0 (unclassified, or currently active)

Subdomains and pages

deleted subdomains

0

page imported products

0

page imported random

0

page imported parking

0

Error counters

count skipped due to recent timeouts on the same server IP

0

count content received but rejected due to 11-799

0

count dns errors

3

count cert errors

0

count timeouts

0

count http 429

0

count http 404

0

count http 403

0

count http 5xx

0

next operation date

2025-03-25 22:12:54

Server

server bits

server ip

-

Mainpage statistics

mp import status

20

mp rejected date

-

mp saved date

-

mp size orig

36960

mp size raw text

14026

mp inner links count

0

mp inner links status

1 (no links)

Open Graph

title

description

image

site name

author

updated

2025-12-15 20:21:36

raw text

LVI: Hijacking Transient Execution with Load Value Injection LVI LVI Demos About Researcher FAQ LVI - Hijacking Transient Execution with Load Value Injection LVI is a new class of transient-execution attacks exploiting microarchitectural flaws in modern processors to inject attacker data into a victim program and steal sensitive data and keys from Intel SGX , a secure vault in Intel processors for your personal data. LVI turns previous data extraction attacks around , like Meltdown , Foreshadow , ZombieLoad , RIDL and Fallout , and defeats all existing mitigations. Instead of directly leaking data from the victim to the attacker, we proceed in the opposite direction: we smuggle — "inject" — the attacker's data through hidden processor buffers into a victim program and hijack transient execution to acquire sensitive information, such as the victim’s fingerprints or passwords. Crucially, LVI is much harder to mitigate t...

Text analysis

redirect type

0 (-)

block type

0 (no issues)

detected language

1 (English)

index version

2025110801

spam phrases

0

Text statistics

text nonlatin

0

text cyrillic

0

text characters

10685

text words

1917

text unique words

720

text lines

252

text sentences

99

text paragraphs

24

text words per sentence

19

text matched phrases

8

text matched dictionaries

8

RSS

rss path

rss status

3 (priority 3 already searched, no matches found)

rss found date

-

rss size orig

0

rss items

0

rss spam phrases

0

rss detected language

0 (awaiting analysis)

inbefore feed id

-

inbefore status

0 (new)

Sitemap

sitemap path

sitemap status

1 (priority 1 already searched, no matches found)

sitemap review version

1

sitemap urls count

0

sitemap urls adult

0

sitemap filtered products

0

sitemap filtered videos

0

sitemap found date

-

sitemap process date

-

sitemap first import date

-

sitemap last import date

-