Tagged articles
12 articles
Page 1 of 1
Black & White Path
Black & White Path
May 12, 2026 · Information Security

How FastGPT’s NoSQL Injection (CVE‑2026‑40351) Enables Admin Login Bypass – A Deep Dive

The FastGPT AI Agent platform suffers a critical NoSQL injection (CVE‑2026‑40351) that lets attackers bypass authentication by injecting MongoDB operators into the password field, granting admin or root access, and the article details the flaw, its impact, proof‑of‑concept, and mitigation steps.

Authentication BypassCVE-2026-40351FastGPT
0 likes · 10 min read
How FastGPT’s NoSQL Injection (CVE‑2026‑40351) Enables Admin Login Bypass – A Deep Dive
Black & White Path
Black & White Path
May 6, 2026 · Information Security

Zero‑Click Android ADB Flaw Lets Attackers Gain Remote Shell Without Interaction

Google’s May 2026 Android security bulletin disclosed CVE‑2026‑0073, a critical zero‑click authentication bypass in the adbd daemon that lets any attacker on the same LAN bypass wireless ADB’s TLS verification and obtain a shell on unpatched Android 14‑16 devices, with detailed exploitation steps and mitigation guidance.

AndroidAuthentication BypassCVE-2026-0073
0 likes · 15 min read
Zero‑Click Android ADB Flaw Lets Attackers Gain Remote Shell Without Interaction
Black & White Path
Black & White Path
May 1, 2026 · Information Security

Deep Dive into cPanel/WHM Auth Bypass Vulnerability (CVE‑2026‑41940)

watchTowr Labs discovered a critical authentication bypass in all supported cPanel & WHM versions (CVE‑2026‑41940) that allows remote attackers to inject session files via crafted HTTP requests, gain root access, and has been observed in the wild; the article details the flaw, exploitation chain, impact, and mitigation steps.

Authentication BypassCVE-2026-41940Mitigation
0 likes · 13 min read
Deep Dive into cPanel/WHM Auth Bypass Vulnerability (CVE‑2026‑41940)
Black & White Path
Black & White Path
Mar 24, 2026 · Information Security

Step‑by‑Step Reconstruction of Mini‑Program/Web Encryption Authentication Bypass Cases

The article walks through six real penetration‑testing scenarios, dissecting common encryption and authentication mechanisms in mini‑programs and web applications, demonstrating how to reverse‑engineer, debug, and script the bypass of Hawk signatures, MD5 timestamps, RSA and AES encryptions to achieve unauthorized data access and account takeover.

AESAuthentication BypassHawk protocol
0 likes · 13 min read
Step‑by‑Step Reconstruction of Mini‑Program/Web Encryption Authentication Bypass Cases
21CTO
21CTO
Sep 12, 2023 · Information Security

BroadWorks Auth Bypass (CVE-2023-20238) & RADIUS DoS (CVE-2023-20243) Alerts

Cisco has issued six security advisories, including a critical authentication bypass vulnerability in its BroadWorks Application Delivery and Extension Service Platform (CVE‑2023‑20238) and a high‑severity RADIUS denial‑of‑service flaw in its Identity Services Engine (CVE‑2023‑20243), with CISA also issuing alerts and urging users to review and mitigate the issues.

Authentication BypassCVE-2023-20238CVE-2023-20243
0 likes · 2 min read
BroadWorks Auth Bypass (CVE-2023-20238) & RADIUS DoS (CVE-2023-20243) Alerts
Programmer DD
Programmer DD
Jan 16, 2021 · Information Security

Bypassing Nacos 1.4.1 User-Agent Authentication to Add Arbitrary Users

The article explains how Nacos 1.4.1's serverIdentity key‑value authentication can be bypassed by manipulating the request path, allowing attackers to call any HTTP interface, add new users, and gain full console access, and provides reproduction steps and a fix recommendation.

Authentication BypassCVENacos
0 likes · 10 min read
Bypassing Nacos 1.4.1 User-Agent Authentication to Add Arbitrary Users
Java Architecture Diary
Java Architecture Diary
Jan 15, 2021 · Information Security

How to Exploit and Patch the Nacos Authentication Bypass Vulnerability (v1.2‑v1.4)

This article explains the Nacos authentication bypass vulnerability affecting versions 1.2‑1.4, how attackers can exploit whitelist headers to gain unauthorized access, the widespread exposure revealed by Zoomeye scans, and the official remediation steps including upgrading to v1.4.1 and disabling the UA whitelist.

Authentication BypassNacosSecurity Vulnerability
0 likes · 3 min read
How to Exploit and Patch the Nacos Authentication Bypass Vulnerability (v1.2‑v1.4)
ITPUB
ITPUB
Mar 3, 2017 · Information Security

How Attackers Exploit SQL Injection and XSS – Techniques and Defenses

This article explains the mechanics of SQL injection and XSS attacks, demonstrates common exploitation methods such as table‑name guessing, error‑based and union queries, shows a vulnerable authentication script, and provides practical defensive coding techniques to mitigate these threats.

Authentication BypassSQL injectionWeb Security
0 likes · 10 min read
How Attackers Exploit SQL Injection and XSS – Techniques and Defenses