Joomla deserialization vulnerability getshell & Command Execution
Note:1. Remember to add points after the command. The command is enclosed in single quotes.2. It is only for learning php code.Usage:Php joomla. php http://xatusec.org getshellPhp
In-depth analysis of Commons Collections Java deserialization Vulnerability0x01 background
So far this year, the most influential Java vulnerability is the CommonsCollections deserialization vulnerability that has been booming for some time.
@
Java deserialization vulnerability batch Detection
PrefaceJava deserialization vulnerabilities have appeared in people's field of view for a while. The Rubik's Cube security team has reproduced this vulnerability and developed a highly accurate
Fixed the X.509 digital certificate BUG in Linux 4.3.2 maintenance edition.
Just one day after the first linux 4.3 kernel maintenance version was updated, the famous kernel maintainer Greg Kroah-Harman published detailed information about the 4.3.
Android ARM 32-bit
0x00
The full name of drop is Return-oriented programming, which is an advanced memory attack technology, it can be used to bypass various universal defenses of modern operating systems (such as memory unexecutable and code
"Talking keyboard": detailed analysis of a malicious promotion Trojan
I. background
In middle November, a rogue software named "talking keyboard" experienced explosive growth. The interception volume increased from zero to more than 0.2 million
Brief Analysis of A DDoS Trojan
This article is a foreign researcher's analysis of a DDoS Trojan. the MD5 of the Trojan file is 67877403db7f8ce451b72924188443f8.
Install
There are two subprograms in the main function of the malware to check whether
SQL injection vulnerability in tongjin cube of financial stocks (affecting the security of stock information leakage)
Detailed description:
Client.mfniu.com was found to have the SQL injection vulnerability in the earlier version of phpcms v9
Xcode 7 Bitcode workflow and Security Evaluation
With the release of Xcode 7, Apple added a new feature Bitcode [1] For Xcode:
New features often mean new attack surfaces. This article first introduces Bitcode and Bitcode-related workflows. After
Technical analysis: How can attackers use blind injection of system commands to achieve "database theft?
In the penetration test or CTF challenge, you may encounter an application that requires the user to input text information, the application
How Pipe solves VulnHub challenges
Today, I will show you how to solve the Pipe challenge in VulnHub.
Of course, CTF is playing with the train of thought. The train of thought in this article is not necessarily the best. You are welcome to download
PHP email injection practice
I. Introduction
Today, the use of the Internet has risen sharply, but the vast majority of Internet users have no security knowledge background. Most people use the Internet to communicate with others by Email. For this
Unauthorized access to Redis results in remote access to server Permissions
Recently, the Rubik's Cube security team has detected a new type of attacks against unauthorized access to Redis. In specific conditions, remote attacks can cause server
Better's hottest package of Privilege Escalation Vulnerability in the dating community for international students involved the leakage of million user data
Register an account first. Click "register by phone ".Enter your mobile phone number to
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.