Skip to content
Loophole & Security

Loophole & Security

Month: February 2022

  • Home
  • 2022
  • February

Is the Log4hell vulnerability?

February 28, 2022 admin

In December 2020, it is bound to become the most profound memory of various Internet companies. At the beginning of December, a nuclear bomb-level system

Read More

15 top vulnerabilities that are hacked to millions of invasive Linux systems

February 28, 2022 admin

There are nearly 14 million Linux-based systems directly to the Internet, which makes them a profitable real world attack target, which may cause them to

Read More

SENTRY Monitoring – SNUBA Data Medium Architecture (SNQL Query Language Introduction)

February 28, 2022 admin

The following is the query structure of SNQL: MATCHsimple | join | subquerySELECT [expressions] | [aggregationsBYexpressions] ARRAYJOIN [column] WHEREcondition [[AND | OR] condition] * HAVINGcondition

Read More

2022 Linux kernel rights vulnerability summary

February 27, 2022 admin

Since this year, there have been many serious security vulnerabilities in Linux, and we have summarized it again for your reference to learn and repair.

Read More

Restore CloudFlare CDN vulnerability

February 27, 2022 admin

CloudFlare has fixed a severity vulnerability in its free open source cDNJS, which may affect 12.7% of websites on the Internet. CDNJS provides more than

Read More

CVE-2021-21193: Chrome 0-day vulnerability

February 26, 2022 admin

On March 12th, Google released the 89.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.4389.9, including 5 secure patches in the new version of the Chrome, which are CVE-2021-21191, CVE-2021-21192 and CVE, respectively,

Read More

Microsoft releases Printnightmare vulnerability patch

February 26, 2022 admin

A few days ago, Microsoft released the security vulnerability patch of Printnightmare, and the attacker can perform full control PC through remote code with the

Read More

The new log4j attack is staring on SolarWinds and Zyxel devices.

February 26, 2022 admin

Microsoft and Akamai’s recent report data show that online criminals attempt to use log4shell vulnerabilities are attacking SolarWinds and Zyxel equipment, known that these devices

Read More

Log4J 2.16.0 released, a list of Apache projects affected by the Log4j vulnerability

February 26, 2022 admin

The log4j of the CVE-2021-44228 vulnerability style was released earlier today published version 2.16.0. 2.16.0 version enhanced vulnerability defense Fully remove support for Message Lookups

Read More

Ubuntu is exposed to serious vulnerabilities, and attackers can easily get root privileges.

February 26, 2022 admin

Recently, GitHub Security Researcher Kevin Backhouse discovers vulnerabilities in Ubuntu20.04 (a long-term support version), which allows any desktop users to add new SUDO users without

Read More

Posts navigation

1 2 … 5 Next

Recent Posts

  • Tiktok vulnerability trigger data and privacy leakage
  • How to quickly deal with Log4J JNDI series vulnerabilities in large data platforms such as CDH / HDP / CDP
  • The researchers have identified two new Internet access vulnerabilities through Mirai malware payload.
  • Analysis of the Vulnerability of Industrial Control System in the first half of 2021
  • 27 SDK rights vulnerabilities or will affect millions of cloud users

Link

antidetect browser

Archives

  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021

Categories

  • No categories
Proudly powered by WordPress | Theme: Fairy by Candid Themes.