Tagged articles
122 articles
Page 1 of 2
Black & White Path
Black & White Path
May 19, 2026 · Information Security

Is BitLocker Hiding a Deliberate Backdoor? Inside the YellowKey Bypass Attack

A security researcher released the YellowKey proof‑of‑concept showing that, on Windows 11 and Server 2022/2025, BitLocker can be bypassed without a password or recovery key by using a crafted USB and multiple reboots, sparking accusations that Microsoft may have embedded a backdoor in the WinRE component.

BitLockerTPMTransactional NTFS
0 likes · 13 min read
Is BitLocker Hiding a Deliberate Backdoor? Inside the YellowKey Bypass Attack
Lin is Dream
Lin is Dream
Mar 26, 2026 · Information Security

Detect and Fix the Critical Apifox Remote Code Execution Vulnerability

This article explains the high‑severity remote code execution and data‑theft flaw discovered in Apifox, outlines how malicious scripts can steal SSH keys, Git credentials and shell history, and provides step‑by‑step Mac and Windows commands for self‑inspection and comprehensive remediation.

ApifoxGitRemediation
0 likes · 7 min read
Detect and Fix the Critical Apifox Remote Code Execution Vulnerability
ITPUB
ITPUB
Mar 23, 2026 · Information Security

Essential Network Security Q&A: From Fundamentals to Advanced Threats

This comprehensive guide answers 100 common network security questions, covering basic concepts, core properties, threat sources, attack types, encryption methods, access controls, incident response, and emerging technologies such as zero‑trust, quantum encryption, and SOAR.

ThreatsVulnerabilityaccess control
0 likes · 44 min read
Essential Network Security Q&A: From Fundamentals to Advanced Threats
AI Insight Log
AI Insight Log
Mar 4, 2026 · Information Security

250k+ OpenClaw Instances Exposed Online – See If Yours Is on the Watchboard

An open‑source watchboard has catalogued over 250,000 publicly exposed OpenClaw AI agents, revealing common misconfigurations such as binding to 0.0.0.0, weak or missing authentication, and the CVE‑2026‑25253 RCE flaw, prompting concrete security recommendations for operators.

AI AgentCVE-2026-25253Exposure
0 likes · 8 min read
250k+ OpenClaw Instances Exposed Online – See If Yours Is on the Watchboard
Black & White Path
Black & White Path
Feb 26, 2026 · Information Security

How AI Enabled a Non‑Expert to Breach 6,700 DJI Vacuums and 600 Firewalls Worldwide

A non‑professional using Claude Code exploited a cloud‑permission flaw in DJI Romo robots to control 6,700 devices across 24 countries, while a separate AI‑driven campaign compromised over 600 Fortinet firewalls in 55 nations, illustrating how generative AI is dramatically lowering the barrier to large‑scale cyber attacks.

AIDJIVulnerability
0 likes · 13 min read
How AI Enabled a Non‑Expert to Breach 6,700 DJI Vacuums and 600 Firewalls Worldwide
Java Tech Enthusiast
Java Tech Enthusiast
Dec 21, 2025 · Information Security

Ultimate Guide to Common Network Ports, Attack Vectors, and Defense Strategies

This article explains what network ports are, classifies well‑known, registered and dynamic ports, demonstrates scanning tools and commands, details common attack techniques such as buffer overflow, DoS and MITM, and provides practical hardening recommendations for the most frequently targeted ports.

SecurityVulnerabilityattack methods
0 likes · 29 min read
Ultimate Guide to Common Network Ports, Attack Vectors, and Defense Strategies
Liangxu Linux
Liangxu Linux
Nov 16, 2025 · Information Security

Essential Linux Security Vulnerabilities & Practical Hardening Guide for Ops Engineers

This comprehensive guide walks ops engineers through the most common Linux security flaws—from sudo misconfigurations and SUID/SGID risks to SSH, web server, kernel, container, file system, logging, firewall, and compliance issues—offering concrete code snippets, step‑by‑step hardening measures, and actionable best‑practice recommendations.

HardeningLinuxOps
0 likes · 16 min read
Essential Linux Security Vulnerabilities & Practical Hardening Guide for Ops Engineers
Java Architect Essentials
Java Architect Essentials
Aug 24, 2025 · Information Security

How Java Serialization Leaks Passwords—and the Simple Fix with transient

This article explains how Java’s native serialization can expose plain‑text passwords, illustrates real‑world breaches, and shows how using the transient keyword together with encryption, library replacement, security frameworks, and penetration testing creates a five‑layer defense against serialization attacks.

JavaMitigationSecurity
0 likes · 6 min read
How Java Serialization Leaks Passwords—and the Simple Fix with transient
Full-Stack DevOps & Kubernetes
Full-Stack DevOps & Kubernetes
May 16, 2025 · Information Security

Critical Ingress‑NGINX RCE Vulnerability (CVE‑2025‑19742): Impact, Exploit Details, and Fixes

A severe security flaw in the ingress‑nginx controller (CVE‑2025‑19742) allows unauthenticated attackers to inject malicious NGINX configuration via the auth‑tls‑match‑cn annotation, leading to remote code execution, secret leakage, and potential full Kubernetes cluster takeover, with detailed remediation steps provided.

RCERemediationSecurity
0 likes · 10 min read
Critical Ingress‑NGINX RCE Vulnerability (CVE‑2025‑19742): Impact, Exploit Details, and Fixes
Java Tech Enthusiast
Java Tech Enthusiast
Sep 4, 2024 · Information Security

Spring and Nacos Security Vulnerabilities and Mitigation Guide

Recent disclosures revealed critical Spring DoS flaws (CVE‑2024‑38809 and CVE‑2024‑38808) exploitable via oversized If‑Match/If‑None‑Match headers and malicious SpEL expressions, plus a Nacos 2.4.1 vulnerability allowing arbitrary file read/write through port 7848, mitigated by upgrading to the patched Spring and Nacos releases or restricting the vulnerable ports.

CVEJavaNacos
0 likes · 7 min read
Spring and Nacos Security Vulnerabilities and Mitigation Guide
OPPO Amber Lab
OPPO Amber Lab
Jul 22, 2024 · Information Security

Exploiting AIDL and Parcelable Mismatches in Android IPC

This article examines how mismatched read/write implementations in Android's Parcelable and AIDL mechanisms create exploitable IPC vulnerabilities, outlines several historical bug patterns, and discusses potential attack vectors and mitigation strategies.

AIDLAndroidIPC
0 likes · 11 min read
Exploiting AIDL and Parcelable Mismatches in Android IPC
Java Tech Enthusiast
Java Tech Enthusiast
Jun 1, 2024 · Information Security

Git CVE-2024-32002 Remote Code Execution Vulnerability Analysis

The article examines Git CVE‑2024‑32002, a remote‑code‑execution flaw that lets attackers run malicious code simply by cloning a crafted repository, exploiting Git hooks, submodules and case‑insensitive symbolic‑link tricks, and advises users to verify their Git version and update to mitigate the risk.

CVE-2024-32002GitRCE
0 likes · 9 min read
Git CVE-2024-32002 Remote Code Execution Vulnerability Analysis
21CTO
21CTO
Mar 23, 2024 · R&D Management

How Embracing Vulnerability Can Transform Engineering Teams

The article explores how accepting vulnerability, building trust, and confronting toxic behavior can reshape software engineering teams, fostering genuine connections, better collaboration, and lasting impact despite the challenges of modern remote work and high‑turnover environments.

Team CultureTrustVulnerability
0 likes · 11 min read
How Embracing Vulnerability Can Transform Engineering Teams
OPPO Amber Lab
OPPO Amber Lab
Jan 26, 2024 · Information Security

BLUFFS Attack: How Bluetooth’s Legacy Security Enables Forward Future Exploits

This article analyzes the BLUFFS vulnerability disclosed at ACM CCS 2023, detailing how the legacy Bluetooth security mechanism (LSC) allows attackers to manipulate authentication and key‑generation parameters, leading to forward‑secrecy and future‑secrecy breaches, and evaluates the impact across devices supporting Bluetooth 4.2‑5.4.

BluetoothLSCSC
0 likes · 27 min read
BLUFFS Attack: How Bluetooth’s Legacy Security Enables Forward Future Exploits
Sohu Tech Products
Sohu Tech Products
Dec 20, 2023 · Information Security

Command Injection Vulnerabilities in Node.js: Analysis and Prevention

The article examines how command‑injection flaws in popular Node.js npm packages such as find‑exec and fs‑git arise from unsafe concatenation of user input into shell commands, and recommends rigorous validation, using execFile or spawn, and regular dependency audits to prevent catastrophic system compromise.

CVECommand InjectionSecure Coding
0 likes · 11 min read
Command Injection Vulnerabilities in Node.js: Analysis and Prevention
OPPO Amber Lab
OPPO Amber Lab
Dec 15, 2023 · Information Security

Uncovering Android Binder Service Vulnerabilities: Exploits, Causes, and Fixes

This article explains the fundamentals of Android Binder services, categorizes Origin, AIDL, HIDL, and Vendor types, describes methods for locating services, and details common vulnerability patterns such as uninitialized memory, out-of-bounds reads/writes, and type confusion, illustrated with real CVE cases and mitigation insights.

AndroidBinderExploit
0 likes · 9 min read
Uncovering Android Binder Service Vulnerabilities: Exploits, Causes, and Fixes
OPPO Amber Lab
OPPO Amber Lab
Nov 30, 2023 · Information Security

Uncovering Android Socket Service Vulnerabilities: Techniques and Case Study

This article details the methodology for discovering and analyzing Android local socket service vulnerabilities, outlines prerequisite skills, explains service classifications, demonstrates data‑handling function tracing, and presents a CVE‑2023‑35694 case study, highlighting common flaw types and mitigation insights.

AndroidCVESecurity
0 likes · 8 min read
Uncovering Android Socket Service Vulnerabilities: Techniques and Case Study
Laravel Tech Community
Laravel Tech Community
Oct 29, 2023 · Information Security

Remote Code Execution Vulnerability in Apache ActiveMQ < 5.18.3 (Deserialization)

Apache ActiveMQ versions prior to 5.18.3 are vulnerable to a deserialization flaw that allows remote code execution via crafted OpenWire messages on port 61616, affecting various activemq-client and activemq-openwire-legacy artifacts, and can be mitigated by upgrading to 5.15.16, 5.16.7, 5.17.6, 5.18.3 or later.

Apache ActiveMQDeserializationMessaging Middleware
0 likes · 3 min read
Remote Code Execution Vulnerability in Apache ActiveMQ < 5.18.3 (Deserialization)
IT Services Circle
IT Services Circle
Oct 18, 2023 · Information Security

Critical libcurl Vulnerabilities (CVE-2023-38545 & CVE-2023-38546) and Upcoming curl 8.4.0 Patch

The article reports two high‑severity libcurl vulnerabilities (CVE‑2023‑38545 and CVE‑2023‑38546) disclosed by curl’s maintainer, explains the limited public information before the scheduled curl 8.4.0 release, and urges developers to upgrade promptly due to the library’s widespread use.

CVE-2023-38545CVE-2023-38546Security
0 likes · 5 min read
Critical libcurl Vulnerabilities (CVE-2023-38545 & CVE-2023-38546) and Upcoming curl 8.4.0 Patch
OPPO Amber Lab
OPPO Amber Lab
Jul 14, 2023 · Information Security

Master Android Framework Vulnerability Hunting: Proven Methods for Beginners

This article introduces the Android Java Framework vulnerability discovery process, outlining characteristic vulnerability types, and presenting three practical methods—historical CVE analysis, feature‑based exploration, and business‑logic testing—along with step‑by‑step guidance and illustrative examples to help beginners quickly start effective Framework security research.

AndroidBug HuntingFramework
0 likes · 11 min read
Master Android Framework Vulnerability Hunting: Proven Methods for Beginners
AntTech
AntTech
Jun 26, 2023 · Blockchain

Detailed Analysis of the Tornado Cash Governance Attack and Smart‑Contract Exploitation

This article examines the multi‑stage Tornado Cash governance attack, explaining the proposal mechanism, token‑locking logic, creation of zombie accounts, use of create/create2, malicious self‑destruct functions, delegatecall exploitation, and the resulting token theft, while highlighting key security lessons for blockchain governance.

BlockchainSecurityDeFiEthereum
0 likes · 17 min read
Detailed Analysis of the Tornado Cash Governance Attack and Smart‑Contract Exploitation
Programmer DD
Programmer DD
Apr 12, 2023 · Information Security

OpenAI Launches $20K Bug Bounty: How Researchers Can Secure AI

OpenAI announced a new Bug Bounty Program offering up to $20,000 for verified vulnerabilities, inviting global security researchers to help secure its AI models while outlining clear rules, out‑of‑scope exclusions, and a partnership with Bugcrowd for reward management.

AI securityBug BountyBugcrowd
0 likes · 7 min read
OpenAI Launches $20K Bug Bounty: How Researchers Can Secure AI
Java Architecture Diary
Java Architecture Diary
Mar 22, 2023 · Information Security

Understanding Spring Framework DoS Vulnerability CVE-2023-20861 and How to Fix It

This article explains the Spring Framework DoS vulnerability (CVE‑2023‑20861), outlines affected versions, details the root cause in SpEL expression handling, and provides step‑by‑step mitigation and upgrade instructions for both Spring Framework and Spring Boot, along with references and security considerations.

CVE-2023-20861DoSMitigation
0 likes · 7 min read
Understanding Spring Framework DoS Vulnerability CVE-2023-20861 and How to Fix It
vivo Internet Technology
vivo Internet Technology
Mar 8, 2023 · Information Security

Web Cache Poisoning and HTTP Request Smuggling: Principles, Attack Scenarios, and Defenses

The article explains how misconfigured caches and inconsistent front‑end/back‑end parsing enable web cache poisoning and HTTP request smuggling attacks, illustrates practical exploitation scenarios, and recommends disabling caching, unifying request‑boundary logic, and adopting HTTP/2 or strict configurations to defend against these high‑impact threats.

Defense StrategiesHTTP request smugglingRequest Smuggling
0 likes · 16 min read
Web Cache Poisoning and HTTP Request Smuggling: Principles, Attack Scenarios, and Defenses
Laravel Tech Community
Laravel Tech Community
Feb 15, 2023 · Information Security

ThinkPHP Deserialization Vulnerability (CVE-2022-45982)

The ThinkPHP framework suffers from a deserialization vulnerability (CVE‑2022‑45982) affecting versions 6.0.0‑6.0.13 and 6.1.0‑6.1.1, where unsanitized user input passed to unserialize() can allow attackers to execute arbitrary system commands, and no official patch has been released yet.

CVE-2022-45982DeserializationPHP
0 likes · 2 min read
ThinkPHP Deserialization Vulnerability (CVE-2022-45982)
Laravel Tech Community
Laravel Tech Community
Dec 29, 2022 · Information Security

Security Vulnerability Analysis of XiongHai CMS 1.0

The article provides a detailed security analysis of the XiongHai CMS 1.0, describing its directory structure and exposing multiple vulnerabilities including file inclusion, SQL injection, XSS, and vertical privilege escalation, along with example exploit code.

CMSSQL injectionVulnerability
0 likes · 8 min read
Security Vulnerability Analysis of XiongHai CMS 1.0
Laravel Tech Community
Laravel Tech Community
Nov 24, 2022 · Information Security

Comprehensive phpMyAdmin Vulnerability Exploitation Guide

This article provides an extensive overview of phpMyAdmin security weaknesses, detailing information‑gathering techniques, version detection, path discovery, multiple exploitation methods such as file writes, log manipulation, slow‑query abuse, user‑defined functions, MOF attacks, and step‑by‑step PoCs for numerous CVEs, all illustrated with concrete SQL and script examples.

CVEExploitationSQL injection
0 likes · 19 min read
Comprehensive phpMyAdmin Vulnerability Exploitation Guide
Code Ape Tech Column
Code Ape Tech Column
Nov 14, 2022 · Information Security

Nacos Permission Bypass Vulnerability and Its Fix

This article explains a permission‑bypass vulnerability in Nacos 1.4.2 caused by a specific User‑Agent header, demonstrates how to reproduce it, and provides step‑by‑step instructions for fixing the issue by upgrading to version 2.1.1 or adjusting configuration files.

NacosPermission BypassSecurity Patch
0 likes · 6 min read
Nacos Permission Bypass Vulnerability and Its Fix
Laravel Tech Community
Laravel Tech Community
Nov 1, 2022 · Information Security

GitLab CE/EE Access Token Leakage Vulnerability (CVE-2022-2882)

The advisory details a GitLab CE/EE vulnerability (CVE‑2022‑2882) that allows authenticated attackers to modify integration URLs and steal GitHub integration access tokens, lists affected versions across community and enterprise editions, and recommends upgrading to specific patched releases.

GitLabVulnerabilityaccess-token
0 likes · 3 min read
GitLab CE/EE Access Token Leakage Vulnerability (CVE-2022-2882)
Laravel Tech Community
Laravel Tech Community
Oct 18, 2022 · Information Security

Linux Kernel Remote Code Execution Vulnerability (CVE-2022-42721)

A remote code execution vulnerability (CVE-2022-42721) affecting Linux kernel versions 5.1 through 5.19.14 allows local attackers to inject malicious WLAN frames that corrupt the mac80211 BSS handling list, enabling execution of arbitrary code, and can be mitigated by upgrading to kernel 5.19.15 or later.

KernelRemote Code ExecutionSecurity
0 likes · 2 min read
Linux Kernel Remote Code Execution Vulnerability (CVE-2022-42721)
Laravel Tech Community
Laravel Tech Community
Oct 11, 2022 · Information Security

Label Studio <1.6.0 SSRF Vulnerability (CVE‑2022‑36551)

Label Studio versions prior to 1.6.0 contain an SSRF flaw that allows authenticated users to access arbitrary files on the server via the data import module, with self‑registration enabled by default, and a proof‑of‑concept exploit is publicly available.

CVE-2022-36551Label StudioSSRF
0 likes · 3 min read
Label Studio <1.6.0 SSRF Vulnerability (CVE‑2022‑36551)
AntTech
AntTech
Oct 11, 2022 · Information Security

In‑Depth Analysis of Hyper‑V DirectX Attack Surface and Related CVEs

The article provides a comprehensive technical walkthrough of the Hyper‑V DirectX component, detailing its architecture, virtual GPU configuration, attack surface, and step‑by‑step exploitation of four critical CVEs (CVE‑2022‑21918, CVE‑2021‑43219, CVE‑2022‑21912, CVE‑2022‑21898) with code snippets and debugging insights.

CVEDirectXHyper-V
0 likes · 11 min read
In‑Depth Analysis of Hyper‑V DirectX Attack Surface and Related CVEs
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Sep 30, 2022 · Information Security

Analysis of Android Bluetooth Protocol Stack Vulnerabilities (CVE-2020-27024, CVE-2021-0918, CVE-2021-39805)

The article examines three Android Bluetooth stack flaws—CVE‑2020‑27024 in the SMP pairing protocol, CVE‑2021‑0918 in GATT notifications, and CVE‑2021‑39805 in L2CAP signaling—detailing their out‑of‑bounds memory errors, underlying code issues, and implications for future Rust‑based stack security.

AndroidBluetoothCVE
0 likes · 15 min read
Analysis of Android Bluetooth Protocol Stack Vulnerabilities (CVE-2020-27024, CVE-2021-0918, CVE-2021-39805)
Laravel Tech Community
Laravel Tech Community
Sep 20, 2022 · Information Security

Path Traversal Vulnerability in Go net/url (CVE-2022-32190)

The Go net/url package contains a path traversal flaw (CVE-2022-32190) where JoinPath fails to strip "../" segments, allowing attackers to access sensitive files, affecting versions prior to 1.18.6 and 1.19.1, and can be mitigated by upgrading to the patched releases.

CVE-2022-32190Vulnerabilitynet/url
0 likes · 3 min read
Path Traversal Vulnerability in Go net/url (CVE-2022-32190)
Open Source Linux
Open Source Linux
Jul 14, 2022 · Information Security

Why Mapping Docker Ports to 127.0.0.1 Isn’t Safe – Exploit and Fix

A recent Docker security issue shows that publishing container ports to 127.0.0.1 does not prevent external access, because Docker adds an iptables rule that forwards traffic to the container’s internal IP, allowing attackers on the same network to reach the service.

SecurityVulnerabilityiptables
0 likes · 7 min read
Why Mapping Docker Ports to 127.0.0.1 Isn’t Safe – Exploit and Fix
Java Backend Technology
Java Backend Technology
Jun 4, 2022 · Information Security

Critical Fastjson Vulnerability: How to Secure Your Java Apps Now

A newly discovered Fastjson vulnerability affecting versions up to 1.2.80 can bypass autoType restrictions, enabling remote attacks, and the advisory outlines the risk, affected versions, upgrade paths, safeMode hardening, the fastjson v2 migration, and none‑autotype alternatives to protect Java applications.

AutoTypeJavaSafeMode
0 likes · 5 min read
Critical Fastjson Vulnerability: How to Secure Your Java Apps Now
MaGe Linux Operations
MaGe Linux Operations
Jun 2, 2022 · Information Security

How a Hacker Cracked Firefox in 8 Seconds: Inside the Pwn2Own Exploit

In the Pwn2Own 2022 competition, hacker Manfred Paul exploited two critical Firefox vulnerabilities in under eight seconds, earning $100,000, while the event also uncovered major bugs across Ubuntu, Tesla, Microsoft, and Safari, highlighting the real-world impact of rapid zero‑day exploits.

FirefoxPwn2OwnSecurity
0 likes · 6 min read
How a Hacker Cracked Firefox in 8 Seconds: Inside the Pwn2Own Exploit
21CTO
21CTO
Apr 29, 2022 · Information Security

How Nimbuspwn Exploits systemd’s networkd-dispatcher for Root Access

Microsoft researchers uncovered the Nimbuspwn vulnerability in systemd’s networkd-dispatcher, detailing how directory‑traversal, symlink‑race, and TOCTOU flaws let attackers replace root‑owned scripts, achieve privilege escalation, and why coordinated patching across hundreds of Linux distributions is critical.

LinuxSecurityVulnerability
0 likes · 4 min read
How Nimbuspwn Exploits systemd’s networkd-dispatcher for Root Access
IT Services Circle
IT Services Circle
Apr 25, 2022 · Information Security

7-Zip Vulnerability CVE-2022-29072: Exploit Details and Temporary Mitigation

A security researcher discovered that 7‑Zip (including version 21.07) contains CVE‑2022‑29072, a vulnerability that can be triggered by dragging a .7z file onto the Help → Content area, leading to privilege escalation and arbitrary command execution, with a temporary fix of deleting the vulnerable 7‑zip.chm file.

7-ZipCVE-2022-29072Temporary Fix
0 likes · 4 min read
7-Zip Vulnerability CVE-2022-29072: Exploit Details and Temporary Mitigation
Java Architect Essentials
Java Architect Essentials
Apr 20, 2022 · Information Security

Critical Spring Cloud Gateway Vulnerabilities CVE-2022-22946 and CVE-2022-22947: Description, Impact, and Mitigation

This article explains the two high‑severity Spring Cloud Gateway vulnerabilities (CVE‑2022‑22946 and CVE‑2022‑22947), detailing their descriptions, affected versions, exploitation conditions, and provides concrete remediation steps such as upgrading to safe releases or disabling the vulnerable actuator endpoints.

CVE-2022-22946CVE-2022-22947Java
0 likes · 5 min read
Critical Spring Cloud Gateway Vulnerabilities CVE-2022-22946 and CVE-2022-22947: Description, Impact, and Mitigation
Programmer DD
Programmer DD
Mar 31, 2022 · Information Security

Is the Rumored Spring “Super” Vulnerability Real? What You Need to Know

The article investigates the circulating rumors of a massive Spring framework vulnerability, clarifies its actual scope—affecting Java 9+ projects—and explains why the alleged CVE differs from official reports, while warning readers to rely only on verified security advisories.

CVE-2022-22963JavaVulnerability
0 likes · 7 min read
Is the Rumored Spring “Super” Vulnerability Real? What You Need to Know
JavaEdge
JavaEdge
Mar 29, 2022 · Information Security

How to Detect and Fix the Spring SPEL Remote Code Execution Vulnerability

This guide explains the Spring SPEL injection flaw, how to determine if your Java application is affected by checking JDK version and Spring usage in WAR or JAR packages, and provides official upgrade steps along with temporary WAF and code‑level mitigations.

DetectionJavaRCE
0 likes · 5 min read
How to Detect and Fix the Spring SPEL Remote Code Execution Vulnerability
Top Architect
Top Architect
Mar 8, 2022 · Information Security

Critical Spring Cloud Gateway Vulnerabilities CVE-2022-22946 and CVE-2022-22947: Description, Impact, and Mitigation

This article explains two high‑severity Spring Cloud Gateway vulnerabilities (CVE‑2022‑22946 and CVE‑2022‑22947), outlines the affected versions, describes how attackers can exploit exposed Actuator endpoints, and provides concrete mitigation steps such as upgrading to safe releases or disabling the gateway actuator.

ActuatorCVE-2022-22946CVE-2022-22947
0 likes · 6 min read
Critical Spring Cloud Gateway Vulnerabilities CVE-2022-22946 and CVE-2022-22947: Description, Impact, and Mitigation
21CTO
21CTO
Feb 14, 2022 · Information Security

Why Adobe, JetBrains, and Google Are Racing to Patch Critical Vulnerabilities in 2022

Adobe released an emergency patch for a critical Magento zero‑day (CVE‑2022‑24086), JetBrains removed Log4j from the IntelliJ platform, and Google unveiled Android 13 "Tiramisu" with new privacy and UI enhancements, highlighting the industry's rapid response to security and usability challenges.

AdobeAndroid13Magento
0 likes · 6 min read
Why Adobe, JetBrains, and Google Are Racing to Patch Critical Vulnerabilities in 2022
21CTO
21CTO
Jan 29, 2022 · Information Security

How Linus Torvalds Exposed a GitHub Fake‑Commit Vulnerability

The article explains how a seemingly prank README submitted by Linus Torvalds leveraged a GitHub "fake‑commit" flaw, demonstrates the malformed URLs used to hide commits, and discusses related GitHub vulnerabilities that remain unpatched, offering insight for security‑aware developers.

GitHubLinus TorvaldsSecurity
0 likes · 5 min read
How Linus Torvalds Exposed a GitHub Fake‑Commit Vulnerability
Open Source Linux
Open Source Linux
Jan 7, 2022 · Information Security

Why Your Docker Images Are Bloated and Vulnerable – A Hands‑On Scan Reveals 358 Flaws

A detailed experiment scans several Docker base images, showing how default Python images contain hundreds of vulnerabilities, while slimmer or Alpine‑based images dramatically reduce the attack surface, highlighting the security trade‑offs of image bloat and the importance of careful base‑image selection.

AlpineContainer SecurityDistroless
0 likes · 13 min read
Why Your Docker Images Are Bloated and Vulnerable – A Hands‑On Scan Reveals 358 Flaws
政采云技术
政采云技术
Dec 30, 2021 · Information Security

Introduction to Web Security Testing and Common Vulnerabilities

This article introduces web security testing, explains why it is essential, describes common vulnerabilities such as weak passwords, XSS, CSRF, SQL injection, authorization bypass, and file upload issues, and offers practical prevention measures and testing guidelines for developers and testers.

SQL injectionVulnerabilityWeb Security
0 likes · 14 min read
Introduction to Web Security Testing and Common Vulnerabilities
Senior Brother's Insights
Senior Brother's Insights
Dec 25, 2021 · Information Security

Why Logback 1.2.7 Is Vulnerable and How to Safely Upgrade

This article explains the Logback CVE‑2021‑42550 vulnerability affecting versions before 1.2.9, outlines the three conditions required for exploitation, compares its severity to Log4j, and provides concrete steps—including upgrading to 1.2.9 and setting the configuration file read‑only—to protect Java applications.

CVE-2021-42550JavaSecurity
0 likes · 5 min read
Why Logback 1.2.7 Is Vulnerable and How to Safely Upgrade
Programmer DD
Programmer DD
Dec 24, 2021 · Information Security

Is Logback’s CVE‑2021‑42550 a Real Threat? How to Safely Upgrade

Logback’s CVE‑2021‑42550 affects versions below 1.2.9, allowing attackers with write access to the configuration file to execute arbitrary code via LDAP, but its severity is rated Medium; upgrading to 1.2.9 or newer, setting config files read‑only, and aligning Spring Boot versions can mitigate the risk.

CVE-2021-42550JavaSpring Boot
0 likes · 4 min read
Is Logback’s CVE‑2021‑42550 a Real Threat? How to Safely Upgrade
Top Architect
Top Architect
Dec 23, 2021 · Information Security

Understanding the Critical Log4j2 Vulnerability and Emergency Mitigation Measures

The article explains the Log4j2 remote code execution flaw caused by unsafe JNDI lookups, outlines its widespread impact on Java applications and major Chinese tech firms, and provides concrete emergency mitigation steps such as JVM parameter changes, firewall rules, and upgrading to version 2.17.0.

JNDIJavaRemediation
0 likes · 7 min read
Understanding the Critical Log4j2 Vulnerability and Emergency Mitigation Measures
OPPO Amber Lab
OPPO Amber Lab
Dec 23, 2021 · Information Security

How Java Deserialization Vulnerabilities Enable Remote Code Execution

This article explains Java's reflection mechanism, details how deserialization flaws in libraries like Apache Commons Collections and Fastjson allow attackers to craft malicious objects that trigger arbitrary command execution, and provides practical proof‑of‑concept steps and mitigation recommendations.

DeserializationExploitJava
0 likes · 7 min read
How Java Deserialization Vulnerabilities Enable Remote Code Execution
JD Cloud Developers
JD Cloud Developers
Dec 16, 2021 · Information Security

Detect and Mitigate the Log4j2 Remote Code Execution Flaw with JD Cloud Tools

This article explains the critical Log4j2 remote code execution vulnerability, offers JD Cloud's free online scanning service, details rapid defense measures using Web Application Firewall and Starshield, and provides step‑by‑step mitigation and upgrade recommendations to protect Java applications.

MitigationVulnerabilityWeb Application Firewall
0 likes · 6 min read
Detect and Mitigate the Log4j2 Remote Code Execution Flaw with JD Cloud Tools
Java Architect Essentials
Java Architect Essentials
Dec 10, 2021 · Information Security

Mitigating the Critical Apache Log4j2 Vulnerability (CVE‑2021‑44228)

The article explains the severe Log4j2 remote‑code‑execution vulnerability affecting versions 2.0 to 2.14.1, provides the official patch link, and lists practical temporary mitigation steps such as JVM flags, configuration changes, environment variables, and network isolation to protect Java applications.

CVE-2021-44228JavaMitigation
0 likes · 3 min read
Mitigating the Critical Apache Log4j2 Vulnerability (CVE‑2021‑44228)
Programmer DD
Programmer DD
Dec 10, 2021 · Information Security

Mitigating the Critical Log4j 2 Remote Code Execution Flaw: Updates and Emergency Fixes

Apache Log4j 2’s recursive lookup flaw enables remote code execution without special configuration, affecting versions up to 2.14.1; the article outlines the vulnerability’s impact, affected components, and provides both permanent fixes—upgrading to 2.15.0‑rc2—and urgent mitigation steps such as JVM flags and environment variable changes.

JavaVulnerabilitylog4j
0 likes · 3 min read
Mitigating the Critical Log4j 2 Remote Code Execution Flaw: Updates and Emergency Fixes
Laravel Tech Community
Laravel Tech Community
Sep 11, 2021 · Information Security

Understanding SQL Injection Vulnerabilities in PHP and How to Prevent Them

This article explains the causes, impacts, and various techniques of SQL injection attacks in PHP applications, demonstrates vulnerable code examples, and provides practical mitigation measures such as input validation, error handling, character encoding considerations, and secure coding practices.

PHPSQL injectionVulnerability
0 likes · 10 min read
Understanding SQL Injection Vulnerabilities in PHP and How to Prevent Them
Java Captain
Java Captain
Jun 19, 2021 · Information Security

Spring Boot Vulnerability Exploitation Resources (GitHub Project)

This article introduces a GitHub repository that documents 16 Spring Boot vulnerabilities, detailing information leakage and remote code execution cases, providing step‑by‑step exploitation guides, underlying principles, and analysis for security research and authorized testing.

ExploitGitHubSecurity
0 likes · 1 min read
Spring Boot Vulnerability Exploitation Resources (GitHub Project)
Programmer DD
Programmer DD
Apr 24, 2021 · Information Security

When a Research Paper Turned Into a Linux Kernel Security Disaster

A controversial university paper on covertly injecting vulnerabilities into open‑source software sparked a chain of malicious Linux kernel patches, provoked a fierce response from maintainer Greg Kroah‑Hartman, and forced the University of Minnesota to suspend the research amid heated community debate.

Academic PaperCode InjectionLinux
0 likes · 7 min read
When a Research Paper Turned Into a Linux Kernel Security Disaster
Top Architect
Top Architect
Apr 18, 2021 · Information Security

WeChat PC Client 0day Vulnerability and Recommended Mitigation Steps

A critical 0day vulnerability in the WeChat Windows desktop client allows attackers to execute shellcode via a crafted web link without leaving files or new processes, prompting users to update to version 3.2.1.143 or apply temporary safeguards such as using the system browser and avoiding unknown links.

0dayPC clientVulnerability
0 likes · 4 min read
WeChat PC Client 0day Vulnerability and Recommended Mitigation Steps
Efficient Ops
Efficient Ops
Apr 6, 2021 · Information Security

What Truly Defines Cybersecurity? Vulnerabilities, Trust, Risk & More

Cybersecurity’s essence is examined from multiple angles—vulnerabilities, adversarial confrontation, trust assumptions, risk management, human awareness, cost considerations, and governance—highlighting that security is not a single concept but a composite of technical, managerial, and strategic layers embodied in the CIA triad.

CIATrustVulnerability
0 likes · 21 min read
What Truly Defines Cybersecurity? Vulnerabilities, Trust, Risk & More
System Architect Go
System Architect Go
Mar 6, 2021 · Information Security

Understanding and Exploiting HTTP Host Header Attacks

This article explains how misconfigured HTTP Host headers can be abused for attacks such as cache poisoning, SSRF, password‑reset poisoning and other server‑side exploits, and provides practical detection methods and defensive recommendations for developers and security engineers.

HTTPHost headerSSRF
0 likes · 26 min read
Understanding and Exploiting HTTP Host Header Attacks
System Architect Go
System Architect Go
Mar 3, 2021 · Information Security

HTTP Request Smuggling

This article explains what HTTP request smuggling is, how the vulnerability arises from conflicting Content‑Length and Transfer‑Encoding headers, describes common CL.TE, TE.CL and TE.TE attack patterns, and outlines detection techniques and defensive measures for modern web infrastructures.

AttackHTTPRequest Smuggling
0 likes · 29 min read
HTTP Request Smuggling
System Architect Go
System Architect Go
Mar 1, 2021 · Information Security

How Attackers Exploit Directory Traversal and How to Defend Against It

This article explains what directory (path) traversal is, demonstrates how attackers can read or write arbitrary files on a server by manipulating file‑path parameters, outlines common bypass techniques, and provides concrete defensive coding practices to mitigate the vulnerability.

VulnerabilityWeb Securitydefense
0 likes · 6 min read
How Attackers Exploit Directory Traversal and How to Defend Against It
MaGe Linux Operations
MaGe Linux Operations
Jan 18, 2021 · Information Security

How to Patch the Critical JumpServer Remote Execution Vulnerability

JumpServer disclosed a remote‑execution flaw on January 15 2021 affecting versions earlier than v2.4.5, v2.5.4 and v2.6.2; users should upgrade to the safe releases or apply a temporary Nginx rule that blocks the vulnerable API endpoints before restarting the service.

JumpServerNGINXSecurity Patch
0 likes · 3 min read
How to Patch the Critical JumpServer Remote Execution Vulnerability
Programmer DD
Programmer DD
Aug 28, 2020 · Information Security

Critical BaoTa Panel Vulnerability (2020): Impact, Global Exposure, and Fixes

A critical vulnerability in BaoTa Linux panel 7.4.2, disclosed on August 23, 2020, allows attackers to bypass authentication, access databases and gain server control; the article details affected versions, global exposure statistics, proof‑of‑concept evidence, and recommended remediation steps.

BaoTaLinux PanelVulnerability
0 likes · 4 min read
Critical BaoTa Panel Vulnerability (2020): Impact, Global Exposure, and Fixes
Architecture Digest
Architecture Digest
Jun 27, 2020 · Information Security

Apache Dubbo Remote Code Execution Vulnerability (CVE-2020-1948): Background, Risk Assessment, Affected Versions, and Mitigation

The article details the high‑severity CVE‑2020‑1948 remote code execution flaw in Apache Dubbo, describing its background, risk rating, affected versions, remediation steps, asset‑mapping data, and a timeline of disclosures to help users protect their Java RPC services.

Apache DubboCVE-2020-1948Java
0 likes · 4 min read
Apache Dubbo Remote Code Execution Vulnerability (CVE-2020-1948): Background, Risk Assessment, Affected Versions, and Mitigation
Programmer DD
Programmer DD
May 30, 2020 · Information Security

Critical Fastjson RCE Vulnerability (≤1.2.68): Risks, Impact, and Fixes

On May 28, 2020, 360CERT reported a high‑severity remote code execution flaw in Alibaba’s Fastjson library (versions ≤1.2.68) that bypasses autotype restrictions, affecting many assets, and provided temporary mitigation steps and upgrade recommendations to safeguard systems.

CVEJavaRemote Code Execution
0 likes · 3 min read
Critical Fastjson RCE Vulnerability (≤1.2.68): Risks, Impact, and Fixes
ITPUB
ITPUB
Feb 16, 2020 · Information Security

Uncovering CVE‑2019‑17564: How Apache Dubbo’s HTTP Protocol Enables Remote Code Execution

Apache Dubbo’s CVE‑2019‑17564 is a high‑severity vulnerability that allows remote code execution via unsafe deserialization when the HTTP protocol is enabled, affecting versions 2.5.x through 2.7.4; the article details the flaw’s mechanics, affected classes, detection methods, and recommended upgrades or WAF protections.

Apache DubboCVE-2019-17564Java RPC
0 likes · 4 min read
Uncovering CVE‑2019‑17564: How Apache Dubbo’s HTTP Protocol Enables Remote Code Execution
Node Underground
Node Underground
Dec 15, 2019 · Information Security

How NPM’s Binary Planting Bug Lets Attackers Access Any File

The article explains two critical npm vulnerabilities—arbitrary file access via a crafted bin field and binary planting that lets globally installed packages replace executables—detailing their impact, how they can be exploited, and urging users to upgrade promptly.

SecurityVulnerabilitybinary planting
0 likes · 4 min read
How NPM’s Binary Planting Bug Lets Attackers Access Any File
System Architect Go
System Architect Go
Sep 17, 2019 · Information Security

Sequelize ORM SQL Injection Vulnerabilities and Affected Versions

The article outlines several SQL injection vulnerabilities discovered in various Sequelize ORM versions, explains the underlying causes related to improper JSON path key handling for MySQL, MariaDB, Postgres, and SQLite, provides reproduction screenshots, and strongly advises upgrading to patched releases.

Node.jsORMSQL injection
0 likes · 3 min read
Sequelize ORM SQL Injection Vulnerabilities and Affected Versions