Tagged articles
122 articles
Page 2 of 2
Programmer DD
Programmer DD
Jul 12, 2019 · Databases

Critical Redis Remote Code Execution Flaw (CNVD‑2019‑21763): Risks & Fixes

A high‑severity Redis remote command execution vulnerability (CNVD‑2019‑21763) discovered in July 2019 allows unauthenticated attackers to load malicious modules and execute arbitrary code, affecting Redis 2.x‑5.x, with no official patch yet and only temporary mitigation steps available.

CNVDDatabase SecurityRemote Code Execution
0 likes · 3 min read
Critical Redis Remote Code Execution Flaw (CNVD‑2019‑21763): Risks & Fixes
360 Tech Engineering
360 Tech Engineering
Jul 3, 2019 · Information Security

File Upload Vulnerabilities and Mitigation Strategies

The article explains how attackers can exploit file upload functionality by uploading malicious files, crafted filenames, SVG payloads, or symlinks to achieve remote code execution, data theft, or server denial‑of‑service, and provides practical defense measures such as whitelist validation, content‑type checks, and upload rate limiting.

Node.jsSVGSecurity
0 likes · 8 min read
File Upload Vulnerabilities and Mitigation Strategies
JD Tech
JD Tech
Mar 15, 2019 · Information Security

Arbitrary URL Redirect Vulnerability and Pitfalls of Java URL.getHost()

The article analyzes an arbitrary URL redirect flaw caused by unchecked returnUrl parameters, demonstrates how Java's URL.getHost() can be misused through backslash and hash bypasses, and provides a robust validation code snippet that works across JDK versions.

JDKSecurityURL redirect
0 likes · 5 min read
Arbitrary URL Redirect Vulnerability and Pitfalls of Java URL.getHost()
Tencent Cloud Developer
Tencent Cloud Developer
Feb 14, 2019 · Information Security

Critical runc Container Escape Vulnerability Advisory (CVE-2019-5736)

A critical CVE‑2019‑5736 vulnerability in the runc container runtime lets a malicious container overwrite the host’s runc binary, granting attackers root‑level code execution that can compromise other containers, the host system, and the network, with a CVSS 3.0 score of 7.2, affecting runc, Apache Mesos and LXC, and requiring prompt updates.

Container SecurityKernel SecurityVulnerability
0 likes · 3 min read
Critical runc Container Escape Vulnerability Advisory (CVE-2019-5736)
ITPUB
ITPUB
Jan 25, 2018 · Information Security

Critical MySQL CVE-2018-2696 & Related Vulnerabilities: Impact, Exploits, and Fixes

Oracle's recent advisory reveals multiple high‑severity MySQL vulnerabilities (CVE‑2018‑2562, CVE‑2018‑2591, CVE‑2018‑2696) that allow unauthenticated denial‑of‑service attacks and potential code execution, outlines affected versions, detection steps, and recommends immediate upgrades to patched releases.

CVE-2018-2696Vulnerabilitymysql
0 likes · 5 min read
Critical MySQL CVE-2018-2696 & Related Vulnerabilities: Impact, Exploits, and Fixes
MaGe Linux Operations
MaGe Linux Operations
Sep 21, 2017 · Information Security

How a Struts2 RCE Vulnerability Turned My Linux Server into a Bitcoin Miner

A Linux server behind multiple firewalls was compromised by a Struts2 remote code execution flaw (CVE‑2017‑5638), leading to a hidden cron job that repeatedly launched a Bitcoin mining script, illustrating how outdated frameworks can expose systems to stealthy resource‑draining attacks.

Bitcoin miningCVE-2017-5638Remote Code Execution
0 likes · 6 min read
How a Struts2 RCE Vulnerability Turned My Linux Server into a Bitcoin Miner
Meituan Technology Team
Meituan Technology Team
Sep 14, 2017 · Information Security

Android Binder Vulnerabilities and Exploitation Techniques Using Drozer

The article reviews real‑world Android Binder vulnerabilities—including lock‑screen bypasses, Samsung shutdown eavesdropping, theme escalation, and system DoS—explains the Binder IPC architecture, and demonstrates how the drozer framework can be used for automated fuzzing, AIDL‑based, reflection‑based, and shell‑script exploitation of high‑privilege services.

AndroidBinderDrozer
0 likes · 14 min read
Android Binder Vulnerabilities and Exploitation Techniques Using Drozer
MaGe Linux Operations
MaGe Linux Operations
Aug 15, 2017 · Information Security

Xshell Backdoor Discovered in Build 1326 – Critical Security Alert

A critical backdoor was discovered in NetSarang’s Xshell 5 Build 1326, where the nssock2.dll module contains malicious code that contacts a remote domain, affecting multiple NetSarang products; the article details the vulnerability, affected versions, behavior, and provides safe download links.

Remote Code ExecutionVulnerabilitybackdoor
0 likes · 4 min read
Xshell Backdoor Discovered in Build 1326 – Critical Security Alert
dbaplus Community
dbaplus Community
Apr 20, 2017 · Information Security

How Oracle Rootkits Hide Backdoors: Techniques, Code Samples, and Detection

This article explains how vulnerabilities, backdoors, and various Oracle rootkit techniques—ranging from simple package tricks to OS‑level and memory‑level attacks—allow attackers to maintain persistent, hidden access to databases, and it offers concrete detection and mitigation strategies.

OracleRootkitVulnerability
0 likes · 19 min read
How Oracle Rootkits Hide Backdoors: Techniques, Code Samples, and Detection
MaGe Linux Operations
MaGe Linux Operations
Mar 24, 2017 · Information Security

How We Detected and Eliminated a Struts2 Mining Malware Attack

This article recounts a recent incident where a Struts2 vulnerability was exploited to run mining malware, detailing the discovery process, forensic analysis of services, processes, network listeners, and the step‑by‑step remediation measures including script‑based scans, permission hardening, and upgrading Struts2.

Struts2Vulnerabilityincident response
0 likes · 4 min read
How We Detected and Eliminated a Struts2 Mining Malware Attack
Ctrip Technology
Ctrip Technology
Nov 1, 2016 · Information Security

Understanding Serialization, Deserialization Vulnerabilities and Mitigation in Java

The article explains Java serialization and deserialization concepts, provides sample code for serializing a string to a file and restoring it, describes how insecure deserialization leads to remote code execution vulnerabilities illustrated by ActiveMQ, JBoss and Jenkins cases, and outlines mitigation techniques such as class whitelisting, encryption, and using transient fields.

DeserializationJavaMitigation
0 likes · 7 min read
Understanding Serialization, Deserialization Vulnerabilities and Mitigation in Java
Node Underground
Node Underground
Sep 23, 2016 · Backend Development

Critical Node.js Security Updates: What You Need to Upgrade This Week

Next Wednesday the Node.js team will release security updates for several versions, fixing critical TLS certificate handling flaws and other vulnerabilities, while announcing the end of maintenance for the v0.10.x line and urging users to upgrade to newer releases.

Node.jsOpenSSLSecurity Updates
0 likes · 2 min read
Critical Node.js Security Updates: What You Need to Upgrade This Week
ITPUB
ITPUB
Aug 22, 2016 · Information Security

How to Exploit and Patch Zabbix’s JSRPC ProfileIdx2 SQL Injection Vulnerability

This article explains the unauthenticated SQL injection flaw in Zabbix's JSRPC profileIdx2 parameter, details its high impact on versions 2.2.x and 3.0.0‑3.0.3, provides a step‑by‑step proof‑of‑concept exploit, and recommends upgrading to version 3.0.4 to remediate the issue.

ExploitSQL injectionVulnerability
0 likes · 4 min read
How to Exploit and Patch Zabbix’s JSRPC ProfileIdx2 SQL Injection Vulnerability
ITPUB
ITPUB
Jan 13, 2016 · Information Security

How Hackers Exploit Smart Doorbells to Steal Your Wi‑Fi Password in Minutes

A recent security report reveals that hackers can compromise popular smart doorbells by unscrewing two screws, forcing the device into AP mode, accessing its built‑in web server via a special URL, and extracting the Wi‑Fi SSID and PSK, highlighting the broader vulnerability of IoT home devices.

Firmware updateIoT securityPen Test Partners
0 likes · 3 min read
How Hackers Exploit Smart Doorbells to Steal Your Wi‑Fi Password in Minutes
ITPUB
ITPUB
Nov 18, 2015 · Information Security

Prevent Remote Code Execution: Securing Java Serialization with a Simple Class Whitelist

The article explains how a widespread Java serialization vulnerability lets attackers execute remote commands by deserializing malicious objects, and describes a practical mitigation that overrides ObjectInputStream’s resolveClass method to enforce a whitelist, preventing unauthorized class instantiation without rewriting application code.

JavaVulnerabilityWhitelist
0 likes · 6 min read
Prevent Remote Code Execution: Securing Java Serialization with a Simple Class Whitelist
Efficient Ops
Efficient Ops
Nov 11, 2015 · Information Security

Why Redis Unauthorized Access Is a Critical Threat and How to Fix It

This article explains a high‑severity Redis unauthorized‑access vulnerability that can let attackers write SSH keys to the host, highlights the risk of exposing Redis to the Internet without authentication, and provides guidance on remediation and network protection.

Network ExposureSecurityVulnerability
0 likes · 4 min read
Why Redis Unauthorized Access Is a Critical Threat and How to Fix It