Tagged articles
38 articles
Page 1 of 1
Black & White Path
Black & White Path
Apr 3, 2026 · Information Security

Chrome’s New High‑Severity 0‑Day: CVE‑2026‑5281 Exploited in the Wild

Google released an emergency update on April 1 2026 fixing a critical Use‑After‑Free vulnerability (CVE‑2026‑5281) in Chrome’s WebGPU Dawn component, which is already exploited in the wild; the article details the flaw’s mechanics, attack flow, affected versions, exploitation challenges, and mitigation recommendations.

CVE-2026-5281ChromeDawn
0 likes · 16 min read
Chrome’s New High‑Severity 0‑Day: CVE‑2026‑5281 Exploited in the Wild
Black & White Path
Black & White Path
Feb 21, 2026 · Information Security

Bypassing Linux Pkeys Security Mechanism in a PWN Challenge

An in‑depth analysis of Linux Memory Protection Keys (pkeys), their x86_64 and arm64 implementations, related syscalls, and a step‑by‑step exploit that randomises PKRU permissions and then uses WRPKRU to bypass the restrictions and capture the flag in a CTF PWN challenge.

CTFExploitLinux
0 likes · 12 min read
Bypassing Linux Pkeys Security Mechanism in a PWN Challenge
Raymond Ops
Raymond Ops
Dec 29, 2024 · Information Security

What Every Hacker Calls It: A Comprehensive Glossary of Cyber Threats

This article provides a detailed glossary of common hacking terms and techniques—from black‑hat attackers and backdoors to APTs, exploits, and dark‑web concepts—explaining each threat, its purpose, and how it impacts information security.

APTExploitThreats
0 likes · 17 min read
What Every Hacker Calls It: A Comprehensive Glossary of Cyber Threats
vivo Internet Technology
vivo Internet Technology
May 15, 2024 · Information Security

Analysis of Android FileProvider, startAnyWhere, and Parcel Asymmetric Vulnerabilities and Exploitation

The article dissects three Android flaws—a misconfigured FileProvider, the privileged startAnyWhere capability, and asymmetric Parcel serialization—showing how their interaction lets an attacker hide a malicious Intent, bypass export checks, read private data, alter system settings, and gain elevated privileges, while outlining mitigation strategies.

AndroidExploitFileProvider
0 likes · 19 min read
Analysis of Android FileProvider, startAnyWhere, and Parcel Asymmetric Vulnerabilities and Exploitation
MaGe Linux Operations
MaGe Linux Operations
Mar 24, 2024 · Information Security

What Every Hacker Should Know: 27 Common Terms and Attack Techniques

This article provides a comprehensive glossary of 27 common hacking terms—from black‑hat and backdoor to zero‑day exploits and dark‑web concepts—explaining each technique, malware type, and security threat in clear, concise English for anyone interested in cybersecurity fundamentals.

APTExploitcybersecurity
0 likes · 18 min read
What Every Hacker Should Know: 27 Common Terms and Attack Techniques
OPPO Amber Lab
OPPO Amber Lab
Dec 15, 2023 · Information Security

Uncovering Android Binder Service Vulnerabilities: Exploits, Causes, and Fixes

This article explains the fundamentals of Android Binder services, categorizes Origin, AIDL, HIDL, and Vendor types, describes methods for locating services, and details common vulnerability patterns such as uninitialized memory, out-of-bounds reads/writes, and type confusion, illustrated with real CVE cases and mitigation insights.

AndroidBinderExploit
0 likes · 9 min read
Uncovering Android Binder Service Vulnerabilities: Exploits, Causes, and Fixes
OPPO Amber Lab
OPPO Amber Lab
Jul 28, 2023 · Information Security

How Mismatched Parcelable Read/Write Leads to Android Exploits and How to Fix Them

This article examines how inconsistencies between Parcelable serialization and deserialization in Android's Binder/Parcel mechanism can cause data misalignment, enabling attackers to craft malicious Bundles that bypass checks, and outlines various exploitation scenarios and mitigation strategies introduced in recent Android releases.

AndroidBinderExploit
0 likes · 17 min read
How Mismatched Parcelable Read/Write Leads to Android Exploits and How to Fix Them
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Oct 21, 2022 · Information Security

DirtyPipe (CVE‑2022‑0847) Vulnerability Analysis and Exploitation on Android/Linux

DirtyPipe (CVE‑2022‑0847) is a high‑severity Linux kernel flaw that lets attackers arbitrarily overwrite any readable file via an uninitialized pipe‑buffer flag, enabling privilege escalation on Android and other systems by patching shared libraries, bypassing SELinux, loading malicious modules, and ultimately gaining root, highlighting urgent need for patches and integrity protections.

CVE-2022-0847DirtyPipeExploit
0 likes · 17 min read
DirtyPipe (CVE‑2022‑0847) Vulnerability Analysis and Exploitation on Android/Linux
Java Backend Technology
Java Backend Technology
Apr 2, 2022 · Information Security

How I Reproduced the Massive Spring RCE Vulnerability (CVE-2022-22965)

This article details the discovery, official announcement, prerequisite conditions, and step‑by‑step reproduction of the critical Spring Framework remote code execution vulnerability (CVE‑2022‑22965), including exploit payloads, JSP backdoor creation, and practical mitigation insights.

Backend SecurityCVE-2022-22965Exploit
0 likes · 10 min read
How I Reproduced the Massive Spring RCE Vulnerability (CVE-2022-22965)
OPPO Amber Lab
OPPO Amber Lab
Dec 23, 2021 · Information Security

How Java Deserialization Vulnerabilities Enable Remote Code Execution

This article explains Java's reflection mechanism, details how deserialization flaws in libraries like Apache Commons Collections and Fastjson allow attackers to craft malicious objects that trigger arbitrary command execution, and provides practical proof‑of‑concept steps and mitigation recommendations.

DeserializationExploitReflection
0 likes · 7 min read
How Java Deserialization Vulnerabilities Enable Remote Code Execution
macrozheng
macrozheng
Dec 23, 2021 · Information Security

Why JNDI Is the Hidden Threat Behind Log4j and Other Java Vulnerabilities

The article explains how JNDI works as a configuration and naming service in Java, shows its use with database drivers, and demonstrates how its SPI mechanism can be abused to load remote code, leading to serious security exploits such as the Log4j vulnerability.

ExploitJNDIjava
0 likes · 6 min read
Why JNDI Is the Hidden Threat Behind Log4j and Other Java Vulnerabilities
Architecture Digest
Architecture Digest
Dec 21, 2021 · Information Security

Apache Log4j2 Remote Code Execution Vulnerability Exploitation Guide

This article introduces Apache Log4j2, explains the remote code execution vulnerability caused by unsafe JNDI lookups, provides step‑by‑step environment setup, PoC code, exploitation instructions, and outlines official patches and temporary mitigation measures for developers and security engineers.

ExploitMitigationRemote Code Execution
0 likes · 5 min read
Apache Log4j2 Remote Code Execution Vulnerability Exploitation Guide
Senior Brother's Insights
Senior Brother's Insights
Dec 12, 2021 · Information Security

Unveiling JNDI: From Basics to Real‑World Log4j2 Exploit with RMI

This article explains the fundamentals of Java Naming and Directory Interface (JNDI), its architecture and typical usage, then walks through a step‑by‑step RMI implementation and demonstrates how JNDI can be abused to craft a Log4j2 remote code execution attack, complete with full code samples and mitigation advice.

ExploitJNDIRMI
0 likes · 20 min read
Unveiling JNDI: From Basics to Real‑World Log4j2 Exploit with RMI
Java Captain
Java Captain
Jun 19, 2021 · Information Security

Spring Boot Vulnerability Exploitation Resources (GitHub Project)

This article introduces a GitHub repository that documents 16 Spring Boot vulnerabilities, detailing information leakage and remote code execution cases, providing step‑by‑step exploitation guides, underlying principles, and analysis for security research and authorized testing.

ExploitGitHubVulnerability
0 likes · 1 min read
Spring Boot Vulnerability Exploitation Resources (GitHub Project)
System Architect Go
System Architect Go
Mar 8, 2021 · Information Security

Insecure Deserialization

This article explains what insecure deserialization is, why it leads to high‑severity attacks, demonstrates typical PHP, Ruby, and Java examples, and provides practical techniques for identifying, exploiting, and mitigating unsafe deserialization vulnerabilities.

DeserializationExploitPHP
0 likes · 27 min read
Insecure Deserialization
21CTO
21CTO
Nov 19, 2020 · Information Security

How to Exploit and Patch Ubuntu’s Silent Sudo User Vulnerability

This article explains a critical Ubuntu flaw that lets a standard user create a new sudo account and gain root privileges without a system password, details the step‑by‑step exploitation process, and outlines the official patches released to fix the issue.

CVEExploitLinux security
0 likes · 6 min read
How to Exploit and Patch Ubuntu’s Silent Sudo User Vulnerability
58 Tech
58 Tech
Sep 4, 2020 · Information Security

Understanding ASLR and Buffer Overflow Exploits on Linux

This article explains the concept of Address Space Layout Randomization (ASLR), illustrates how buffer overflow attacks work on Linux, shows step‑by‑step exploitation with disabled ASLR, analyzes memory layout calculations, and discusses the impact of PIE and modern mitigation techniques.

ASLRExploitLinux security
0 likes · 6 min read
Understanding ASLR and Buffer Overflow Exploits on Linux
Java Backend Technology
Java Backend Technology
Jul 16, 2020 · Information Security

How Java Deserialization Enables Remote Code Execution – Exploit Chains and Fixes

This article explains the mechanics of Java deserialization vulnerabilities, demonstrates how malicious payloads can trigger Runtime.exec via Commons‑Collections transformers and AnnotationInvocationHandler, showcases full exploit code, discusses Dubbo‑specific issues, and provides practical mitigation strategies.

Commons-CollectionsDeserializationDubbo
0 likes · 17 min read
How Java Deserialization Enables Remote Code Execution – Exploit Chains and Fixes
360 Tech Engineering
360 Tech Engineering
Jun 21, 2019 · Information Security

A Comprehensive Guide to Office 0‑day/1‑day Vulnerabilities (2010‑2018)

This article expands on the author's BlueHat Shanghai 2019 presentation, summarizing Office‑related 0‑day and 1‑day vulnerabilities discovered between 2010 and 2018, categorizing them by component and type, and providing extensive references, analysis notes, and exploitation guidance for security researchers.

0dayCVEExploit
0 likes · 25 min read
A Comprehensive Guide to Office 0‑day/1‑day Vulnerabilities (2010‑2018)
JD Tech
JD Tech
Jan 21, 2019 · Information Security

Analysis of a PriorityQueue-Based Java Deserialization Gadget Using ysoserial

This article examines how a specially crafted PriorityQueue object, generated via the ysoserial tool, can be serialized and later trigger malicious code execution during Java deserialization, detailing the construction of the gadget, the transformation chain, and the underlying JVM mechanisms that enable the exploit.

DeserializationExploitGadget
0 likes · 13 min read
Analysis of a PriorityQueue-Based Java Deserialization Gadget Using ysoserial
MaGe Linux Operations
MaGe Linux Operations
Aug 26, 2018 · Information Security

Step‑by‑Step Linux Privilege Escalation and Exploit Techniques

This guide walks through creating a PHP backdoor, leveraging Python pty for interactive shells, compiling and using arpsniffer and linsniffer, performing network sniffing with tcpdump, applying various Linux privilege‑escalation exploits, and establishing persistent root access on vulnerable systems.

Exploitinformation securityphp backdoor
0 likes · 11 min read
Step‑by‑Step Linux Privilege Escalation and Exploit Techniques
Alibaba Cloud Native
Alibaba Cloud Native
Mar 29, 2018 · Information Security

Understanding Meltdown: How Intel CPUs Leak Kernel Data via Side‑Channel Attacks

The article explains the Meltdown vulnerability affecting Intel CPUs, detailing how malicious unprivileged code can exploit out‑of‑order execution and a Flush+Reload side‑channel to read kernel memory, describing the attack path, secret channel construction, page‑fault handling, probe array setup, and code examples.

ExploitIntelMeltdown
0 likes · 9 min read
Understanding Meltdown: How Intel CPUs Leak Kernel Data via Side‑Channel Attacks
MaGe Linux Operations
MaGe Linux Operations
Dec 26, 2017 · Information Security

Deploy a One‑Line PHP Backdoor and Escalate Linux Privileges

This guide shows how to plant a PHP backdoor, obtain an interactive shell, enumerate system information, compile and use network sniffers, modify source to capture credentials, and exploit Linux kernel and configuration weaknesses to achieve root access.

ExploitLinuxnetwork sniffing
0 likes · 10 min read
Deploy a One‑Line PHP Backdoor and Escalate Linux Privileges
Meituan Technology Team
Meituan Technology Team
Sep 28, 2017 · Information Security

Analysis and Exploitation of Spring Data REST CVE-2017-8046 Remote Code Execution Vulnerability

The article examines Spring Data REST’s CVE‑2017‑8046 remote‑code‑execution flaw, showing how a malicious JSON Patch path is turned into an unchecked SpEL expression that can run arbitrary commands, reproduces the exploit on a sample Spring Boot app, and advises upgrading to versions that include the path‑verification fix.

Backend SecurityCVE-2017-8046Exploit
0 likes · 17 min read
Analysis and Exploitation of Spring Data REST CVE-2017-8046 Remote Code Execution Vulnerability
dbaplus Community
dbaplus Community
Nov 1, 2016 · Information Security

Exploiting Message Queue Injection to Hijack Distributed Nodes with Celery

The article explains how insecure serialization in message‑queue middleware, especially Python's pickle used by Celery, can be abused to inject malicious payloads that trigger remote code execution on distributed workers, and it demonstrates detection and exploitation techniques against vulnerable Redis and MongoDB brokers.

ExploitMessage QueuePython
0 likes · 17 min read
Exploiting Message Queue Injection to Hijack Distributed Nodes with Celery
ITPUB
ITPUB
Oct 31, 2016 · Information Security

Uncovering Linux Buffer Overflow Exploits: Stack Frames, Code Samples, and Defense

This article explains Linux process address space layout and stack‑frame structure, demonstrates a classic buffer‑overflow attack with full source code and compilation steps, analyzes how the exploit gains root privileges, and discusses why modern compilers and shells affect the attack's success.

Exploitbuffer overflowsecurity
0 likes · 15 min read
Uncovering Linux Buffer Overflow Exploits: Stack Frames, Code Samples, and Defense
ITPUB
ITPUB
Aug 22, 2016 · Information Security

How to Exploit and Patch Zabbix’s JSRPC ProfileIdx2 SQL Injection Vulnerability

This article explains the unauthenticated SQL injection flaw in Zabbix's JSRPC profileIdx2 parameter, details its high impact on versions 2.2.x and 3.0.0‑3.0.3, provides a step‑by‑step proof‑of‑concept exploit, and recommends upgrading to version 3.0.4 to remediate the issue.

ExploitSQL injectionVulnerability
0 likes · 4 min read
How to Exploit and Patch Zabbix’s JSRPC ProfileIdx2 SQL Injection Vulnerability