Illegal websites should not initiate any form of manual service requests to our staff. It is strictly prohibited to use honmau Media's technical support services and products to engage in any illegal activities. If discovered, no technical support will be provided.×
Current location:home
The following are the results of the system search: with keywordsvulnerabilityarticle

[Baota Official Announcement] Announcement on rumored Baota Panel or Nginx abnormalities

Source: There are currently individual users reporting that a horse was hanged on the Baota Official Forum. Our company immediately organized a technical team to follow up and investigate. After 2 days of emergency investigation, no security loopholes in Nginx and panels were found, and no large-scale horse was hanged. situation; After analysis, the main behavior of this Trojan horse is to tamper with Ng

detailed+
2022-12-10

Discuz! X UCenter appears high-risk securityvulnerabilityPlease repair it as soon as possible!

Recently, Discuz! The Security Center has detected a high-risk security issue in a UCenter, which may cause some sites to fail to correctly count the number of login failures, resulting in the risk of sites being blasted by passwords. Through a specially configured or designed program, you can crack passwords unlimited times.

detailed+
2021-08-07

[Security Warning] About LinuxTCP

Recently, the Linux kernel has been exposed to a TCP "SACK PANIC" remote denial of service vulnerability (vulnerability numbers: CVE-2019-11477,CVE-2019-11478,CVE-2019-11479), which can be exploited by attackers

detailed+
2019-06-27

Discuz! X3.4 X3.3 UC(/uc_server/data/tmp) upload executionvulnerabilityrepair

Discuz! X3.4 X3.3 UC(/uc_server/data/tmp) upload and execute vulnerability fix (Alibaba Cloud hot fix): Introduction: In Discuz, uc_key is the communication key for UC client to communicate with server, dis

detailed+
2018-09-10

Linux exposed to high riskvulnerabilityPress Enter for 70 seconds to gain root privileges

At present, a new vulnerability has once again been exposed in the Linux system. The vulnerability code CVE-2016-4484 allows an attacker to gain root privileges on the initramfs shell by pressing the Enter key for 70 seconds, giving the attacker the ability to crack the Linux device.

detailed+
2018-01-02

Alibaba Cloud was exposed to major securityvulnerabilityAll machine rights, all user information may have been disclosed

Just as Alibaba Cloud was promoting its data security in a high-profile manner, a major security incident occurred! On September 1, multiple cloud hosting forums and discussion groups exploded. The reason was that Alibaba Cloud, the largest cloud hosting service provider in China, had another major security incident, and system commands and executable files were deleted from a wide range of users

detailed+
2017-12-09

Emergency: GHOST CVE-2015-0235vulnerabilityand emergency repair methods

Regarding this vulnerability, security researchers have recently exposed a serious security vulnerability called Ghost (GHOST), which can allow attackers to remotely obtain the highest control privileges of the operating system, affecting a large number of Linux operating systems and their distributions on the market. The CVE number for this vulnerability is CVE-2

detailed+
2015-02-01
Message Board
* Contact customer service for urgent issues
submitted
submission
Working days: 8:30 - 22:00 Online QQ

customer service

Company Introduction
top