Tagged articles
24 articles
Page 1 of 1
Su San Talks Tech
Su San Talks Tech
May 17, 2026 · Information Security

Nginx’s 18‑Year‑Old RCE Flaw Exposes One‑Third of Websites

A critical Nginx vulnerability (CVE‑2026‑42945, CVSS 9.2) discovered by depthfirst and F5 allows unauthenticated remote code execution via a single crafted HTTP request, affecting versions 0.6.27‑1.30.0 and roughly one‑third of global websites.

CVE-2026-42945NginxRCE
0 likes · 11 min read
Nginx’s 18‑Year‑Old RCE Flaw Exposes One‑Third of Websites
Black & White Path
Black & White Path
Apr 22, 2026 · Information Security

Multi‑Stage Web‑Induced RCE Attack Bypassing OpenClaw’s Safeguards

The article dissects a multi‑stage web‑induced remote code execution attack against OpenClaw, detailing how crafted HTML pages manipulate the tool‑calling workflow, evade built‑in security notices, and ultimately trigger a malicious curl‑pipe‑python command, followed by a thorough source‑code analysis and defensive recommendations.

AI securityOpenClawRCE
0 likes · 21 min read
Multi‑Stage Web‑Induced RCE Attack Bypassing OpenClaw’s Safeguards
Black & White Path
Black & White Path
Apr 13, 2026 · Information Security

How React Server Functions Enable Prototype Pollution RCE (CVE‑2025‑55182)

The article examines CVE‑2025‑55182, a critical prototype‑pollution vulnerability in React Server Functions that allows remote code execution in frameworks like Next.js, detailing the JSON payload injection using __proto__ or constructor.prototype, the serialization flaw, and the resulting impact on Node.js environments.

CVE-2025-55182Next.jsPrototype Pollution
0 likes · 2 min read
How React Server Functions Enable Prototype Pollution RCE (CVE‑2025‑55182)
21CTO
21CTO
Feb 3, 2026 · Information Security

Critical PHPUnit CVE-2026-24765: How Unsafe Coverage Files Enable RCE in CI/CD Pipelines

A high‑severity CVE‑2026‑24765 in the widely used PHP unit‑testing framework PHPUnit allows attackers to inject malicious coverage files that trigger unsafe deserialization and remote code execution during CI/CD test runs, prompting immediate upgrades to patched releases across all active branches.

PHPRCESecurity
0 likes · 4 min read
Critical PHPUnit CVE-2026-24765: How Unsafe Coverage Files Enable RCE in CI/CD Pipelines
Full-Stack DevOps & Kubernetes
Full-Stack DevOps & Kubernetes
May 16, 2025 · Information Security

Critical Ingress‑NGINX RCE Vulnerability (CVE‑2025‑19742): Impact, Exploit Details, and Fixes

A severe security flaw in the ingress‑nginx controller (CVE‑2025‑19742) allows unauthenticated attackers to inject malicious NGINX configuration via the auth‑tls‑match‑cn annotation, leading to remote code execution, secret leakage, and potential full Kubernetes cluster takeover, with detailed remediation steps provided.

RCERemediationSecurity
0 likes · 10 min read
Critical Ingress‑NGINX RCE Vulnerability (CVE‑2025‑19742): Impact, Exploit Details, and Fixes
Java Tech Enthusiast
Java Tech Enthusiast
Jun 1, 2024 · Information Security

Git CVE-2024-32002 Remote Code Execution Vulnerability Analysis

The article examines Git CVE‑2024‑32002, a remote‑code‑execution flaw that lets attackers run malicious code simply by cloning a crafted repository, exploiting Git hooks, submodules and case‑insensitive symbolic‑link tricks, and advises users to verify their Git version and update to mitigate the risk.

CVE-2024-32002GitRCE
0 likes · 9 min read
Git CVE-2024-32002 Remote Code Execution Vulnerability Analysis
Java Tech Enthusiast
Java Tech Enthusiast
May 28, 2024 · Information Security

Remote Code Execution Vulnerability in Git (CVE-2024-32002) Explained

Git’s CVE‑2024‑32002 is a critical remote‑code‑execution flaw where a malicious repository can exploit hooks, submodules, and symlinks on case‑insensitive file systems to inject and run attacker‑controlled scripts during a recursive clone, affecting versions up to 2.45.0 and mitigated by disabling recursive submodule fetching, avoiding untrusted clones, and updating Git.

CVE-2024-32002GitRCE
0 likes · 9 min read
Remote Code Execution Vulnerability in Git (CVE-2024-32002) Explained
Java Backend Technology
Java Backend Technology
Apr 2, 2022 · Information Security

How I Reproduced the Massive Spring RCE Vulnerability (CVE-2022-22965)

This article details the discovery, official announcement, prerequisite conditions, and step‑by‑step reproduction of the critical Spring Framework remote code execution vulnerability (CVE‑2022‑22965), including exploit payloads, JSP backdoor creation, and practical mitigation insights.

Backend SecurityCVE-2022-22965Exploit
0 likes · 10 min read
How I Reproduced the Massive Spring RCE Vulnerability (CVE-2022-22965)
JavaEdge
JavaEdge
Mar 29, 2022 · Information Security

How to Detect and Fix the Spring SPEL Remote Code Execution Vulnerability

This guide explains the Spring SPEL injection flaw, how to determine if your Java application is affected by checking JDK version and Spring usage in WAR or JAR packages, and provides official upgrade steps along with temporary WAF and code‑level mitigations.

DetectionJavaRCE
0 likes · 5 min read
How to Detect and Fix the Spring SPEL Remote Code Execution Vulnerability
Alibaba Cloud Native
Alibaba Cloud Native
Dec 13, 2021 · Information Security

How to Block Log4j2 RCE Attacks in Four Simple Steps with Alibaba Cloud ARMS

The article explains the massive impact of the Log4j2 remote code execution vulnerability, details why its JNDI lookup is easily exploitable, lists affected software, and provides a concise four‑step guide using Alibaba Cloud ARMS RASP to detect, monitor, and block attacks while offering remediation recommendations.

ARMSCloud NativeRASP
0 likes · 6 min read
How to Block Log4j2 RCE Attacks in Four Simple Steps with Alibaba Cloud ARMS
ITPUB
ITPUB
Dec 10, 2021 · Information Security

Why the Log4j2 RCE Bug Is a Global Threat and How to Fix It

The Log4j2 remote code execution vulnerability (CVE‑2021‑44228, CNVD‑2021‑95914) affects all Java‑based applications from version 2.0 to 2.15.0‑rc1, allowing unauthenticated attackers to execute arbitrary code, and requires immediate inventory, patching, and hardening measures across all affected systems.

JavaRCEVulnerability Management
0 likes · 6 min read
Why the Log4j2 RCE Bug Is a Global Threat and How to Fix It
Programmer DD
Programmer DD
Aug 24, 2021 · Information Security

Fastjson RCE Chains: JdbcRowSetImpl, TemplatesImpl, and BasicDataSource Exploits

This article analyzes three Fastjson deserialization exploit chains—JdbcRowSetImpl, TemplatesImpl, and BasicDataSource—detailing how crafted JSON payloads trigger JNDI lookups, load remote malicious bytecode, and ultimately achieve remote code execution without requiring special Fastjson features.

DeserializationJNDIJava
0 likes · 13 min read
Fastjson RCE Chains: JdbcRowSetImpl, TemplatesImpl, and BasicDataSource Exploits