<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Websec Cybersecurity Blog</title><description>Expert insights, trends, research findings, and best practices from Websec security team to help you strengthen your organization&apos;s security posture.</description><link>https://websec.com/</link><language>en-us</language><lastBuildDate>Tue, 21 Apr 2026 11:27:01 GMT</lastBuildDate><image><url>https://websec.com/images/websec-logo-1.png</url><title>Websec Cybersecurity Blog</title><link>https://websec.com/blog</link></image><copyright>Copyright 2026 Websec Security</copyright><item><title>A Comparison Between the Real User ID and the Effective User ID is not Enough to Prevent Privilege Escalation</title><link>https://websec.com/blog/comparison-between-real-user-id-and-effective-user-id-is-not-enough-to-prevent-privilege-escalation/</link><guid isPermaLink="true">https://websec.com/blog/comparison-between-real-user-id-and-effective-user-id-is-not-enough-to-prevent-privilege-escalation/</guid><description>In Unix-like systems, processes have a real and effective user ID determining their access permissions. While usually identical, they can differ in situations like when the setuid bit is activated in executables.</description><pubDate>Tue, 03 Oct 2023 19:39:50 GMT</pubDate><category>Blog</category><category>CVE-2015-5198</category><category>Checkmarx</category><category>CodeQL</category><category>UNIX</category><author>Websec Security Team</author></item><item><title>CVE-2022-21404: Another story of developers fixing vulnerabilities unknowingly because of CodeQL</title><link>https://websec.com/blog/CVE-2022-21404-Another-story-of-developers-fixing-vulnerabilities-unknowingly-because-of-CodeQL/</link><guid isPermaLink="true">https://websec.com/blog/CVE-2022-21404-Another-story-of-developers-fixing-vulnerabilities-unknowingly-because-of-CodeQL/</guid><description>How CodeQL may help reduce false negatives within Open-Source projects. Taking a look into a deserialization vulnerability within Oracle Helidon (CVE-2022-21404).</description><pubDate>Thu, 19 May 2022 18:18:09 GMT</pubDate><category>Blog</category><category>CVE-2022-21404</category><category>CodeQL</category><category>Deserialization</category><category>Java</category><category>Oracle</category><category>SnakeYAML</category><category>YAML</category><author>Websec Security Team</author></item><item><title>Cybersecurity in Web Applications - Where to start? Where to improve? Where to learn more?</title><link>https://websec.com/blog/Appsec-Resources-For-Developers-Where-To-Start/</link><guid isPermaLink="true">https://websec.com/blog/Appsec-Resources-For-Developers-Where-To-Start/</guid><description>A list of resources for web application security and a short description of what each resource covers.</description><pubDate>Thu, 02 Sep 2021 17:46:16 GMT</pubDate><category>Blog</category><category>ASVS</category><category>Framework</category><category>NIST</category><category>OWASP</category><category>WSTG</category><category>cybersecurity</category><category>proactive controls</category><category>standards</category><category>web app security</category><author>Websec Security Team</author></item><item><title>Hardening guide for JBoss EAP 7.0</title><link>https://websec.com/blog/Hardening-guide-for-JBoss-EAP-7-0/</link><guid isPermaLink="true">https://websec.com/blog/Hardening-guide-for-JBoss-EAP-7-0/</guid><description>This time we are sharing a hardening guide for JBoss EAP 7.0 servers.</description><pubDate>Fri, 14 Dec 2018 22:39:19 GMT</pubDate><category>Blog</category><category>EAP</category><category>Hardening</category><category>JBoss</category><category>Paulino Calderon</category><author>Websec Security Team</author></item><item><title>Nmap scripts for Trane Tracer SC HVAC</title><link>https://websec.com/blog/Nmap-scripts-for-Trane-Tracer-SC-HVAC/</link><guid isPermaLink="true">https://websec.com/blog/Nmap-scripts-for-Trane-Tracer-SC-HVAC/</guid><description>8.8 Mexico will take place on October 11 in Mexico City. Websec will be represented by Paulino Calderón who will give his talk, &quot;Defeating Monkeys with Scanners&quot;.</description><pubDate>Fri, 14 Dec 2018 22:38:29 GMT</pubDate><category>Blog</category><category>Calderon</category><category>HVAC</category><category>Paulino</category><category>SC</category><category>Tracer</category><author>Websec Security Team</author></item><item><title>Ncrack and Nmap NSE development for offense and defense -  DEFCON CHINA</title><link>https://websec.com/blog/Ncrack-and-Nmap-NSE-development-for-offense-and-defense-DEFCON-CHINA/</link><guid isPermaLink="true">https://websec.com/blog/Ncrack-and-Nmap-NSE-development-for-offense-and-defense-DEFCON-CHINA/</guid><description>Paulino Calderon (@calderpwn) represented Websec in the first edition in China of the world-renowned DEFCON event. Here we share all the material of your workshop.</description><pubDate>Fri, 14 Dec 2018 22:31:13 GMT</pubDate><category>Blog</category><category>Calderon</category><category>China</category><category>DEFCON</category><category>Nmap</category><category>Paulino</category><category>nse</category><author>Websec Security Team</author></item><item><title>Launching replay attacks against the Wells Fargo Wallet service</title><link>https://websec.com/blog/launching-replay-attacks-wells-fargo-wallet-service/</link><guid isPermaLink="true">https://websec.com/blog/launching-replay-attacks-wells-fargo-wallet-service/</guid><description>The Wells Fargo Wallet service is susceptible to replay attacks, where an attacker may intercept a transaction through an altered PoS or fake terminal, steal the sensitive token, and replay the token later.</description><pubDate>Tue, 20 Nov 2018 19:28:28 GMT</pubDate><category>Blog</category><category>Attacks</category><category>Fargo</category><category>Mendoza</category><category>NFC</category><category>Payment</category><category>Salvador</category><category>Wells</category><category>netxing</category><author>Websec Security Team</author></item><item><title>Three Non Web-based XSS Injections</title><link>https://websec.com/blog/Three-Non-Web-based-XSS-Injections/</link><guid isPermaLink="true">https://websec.com/blog/Three-Non-Web-based-XSS-Injections/</guid><description>In this post guest blogger Alejandro Hernandez (nitr0us) writes about some interesting and fun XSS vectors which are not commonly seen.</description><pubDate>Tue, 19 Dec 2017 00:00:00 GMT</pubDate><category>Blog</category><category>Alejandro</category><category>Cross-site Scripting</category><category>Hernandez</category><category>Injection</category><category>Non-web</category><category>XSS</category><category>nitr0usmx</category><author>Websec Security Team</author></item><item><title>Belkin Wemo Switch NMap Scripts</title><link>https://websec.com/blog/Belkin-Wemo-Switch-NMap-Scripts/</link><guid isPermaLink="true">https://websec.com/blog/Belkin-Wemo-Switch-NMap-Scripts/</guid><description>Belkin Wemo Switch Smart Plug is a network controlled power outlet. The current firmware version does not requiere authentication to switch the power ON or OFF or to gather information such as nearby wireless networks. Two NMap scripts have been published</description><pubDate>Fri, 23 Jun 2017 00:00:00 GMT</pubDate><category>Blog</category><category>Belkin</category><category>Network</category><category>Nmap</category><category>Power Outlet</category><category>Scripts</category><category>Smart Plug</category><category>Switch</category><category>Wemo</category><category>nse</category><author>Websec Security Team</author></item><item><title>New publication: Mastering the Nmap Scripting Engine</title><link>https://websec.com/blog/mastering-the-nmap-scripting-engine/</link><guid isPermaLink="true">https://websec.com/blog/mastering-the-nmap-scripting-engine/</guid><description>We invite you to learn more about the latest publication from our team, &quot;Mastering the Nmap Scripting Engine&quot;.</description><pubDate>Tue, 29 Nov 2016 05:41:58 GMT</pubDate><category>Blog</category><category>Engine</category><category>Mastering</category><category>Nmap</category><category>Scripting</category><category>nse</category><author>Websec Security Team</author></item><item><title>Downloading an Application&apos;s Entire Source Code Through an Exposed GIT Directory</title><link>https://websec.com/blog/downloading-entire-source-code-through-exposed-GIT-directory/</link><guid isPermaLink="true">https://websec.com/blog/downloading-entire-source-code-through-exposed-GIT-directory/</guid><description>Website administrators sometimes inadvertently leave an exposed .git directory, from which it is possible to download the entire source code of the web application using just wget and a common server misconfiguration.</description><pubDate>Fri, 19 Feb 2016 23:45:19 GMT</pubDate><category>Blog</category><category>Alevsk</category><category>Dirb</category><category>Dirbuster</category><category>Directory Listing</category><category>Git</category><category>Source Code</category><author>Websec Security Team</author></item><item><title>Backdoors in Zhone GPON 2520 and Alcatel Lucent I240Q</title><link>https://websec.com/blog/backdoors-in-Zhone-GPON-2520-and-Alcatel-Lucent-I240Q/</link><guid isPermaLink="true">https://websec.com/blog/backdoors-in-Zhone-GPON-2520-and-Alcatel-Lucent-I240Q/</guid><description>While examining the &quot;dropbear&quot; binary for the&amp;nbsp;Zhone GPON 2520 and Alcatel Lucent I240Q, we found that both routers have backdoors that allow users with SSH access to connect to these devices with maximum privileges.</description><pubDate>Thu, 08 Jan 2015 00:00:00 GMT</pubDate><category>Blog</category><category>240</category><category>2520</category><category>Alcatel</category><category>Backdoor</category><category>GPON</category><category>Infinitum</category><category>Lucent</category><category>Play</category><category>SSH</category><category>Total</category><category>Zhone</category><category>i240q</category><author>Websec Security Team</author></item><item><title>Drive By ONT Botnet with IRC C&amp;C</title><link>https://websec.com/blog/drive-by-ONT-botnet-with-IRC-CC/</link><guid isPermaLink="true">https://websec.com/blog/drive-by-ONT-botnet-with-IRC-CC/</guid><description>Demonstration of a botnet created purely by using embedded devices which are controlled remotely through vulnerabilities exploited from a webpage.</description><pubDate>Thu, 19 Dec 2013 18:21:40 GMT</pubDate><category>Blog</category><category>Alcatel</category><category>Botnet</category><category>Drive by</category><category>I-240W-Q</category><category>Lucent</category><category>Ont</category><author>Websec Security Team</author></item><item><title>(IN)secure session data in CodeIgniter</title><link>https://websec.com/blog/insecure-session-data-CodeIgniter/</link><guid isPermaLink="true">https://websec.com/blog/insecure-session-data-CodeIgniter/</guid><description>A security analysis on how web applications created with the PHP framework CodeIgniter handle user sessions.</description><pubDate>Thu, 04 Jul 2013 08:05:18 GMT</pubDate><category>Blog</category><category>CodeIgniter</category><category>Framework</category><category>Insecure</category><category>PHP</category><category>Session</category><category>User</category><category>Web Security</category><author>Websec Security Team</author></item><item><title>Panoptic - A tool to exploit path traversal vulnerabilities</title><link>https://websec.com/blog/panoptic/</link><guid isPermaLink="true">https://websec.com/blog/panoptic/</guid><description>An overview of Panoptic, an open source penetration testing tool that automates the process of search and retrieval of common log and config files through path traversal vulnerabilities.</description><pubDate>Sun, 14 Apr 2013 14:08:56 GMT</pubDate><category>Blog</category><category>LFI</category><category>Panoptic</category><category>Python</category><category>RFI</category><category>Tool</category><author>Websec Security Team</author></item><item><title>Special discount code for &quot;Nmap 6: Network Exploration and Security Auditing Cookbook&quot;</title><link>https://websec.com/blog/hackerhalted-discount-code-for-nmap-6-network-exploration-and-security-auditing-cookbook/</link><guid isPermaLink="true">https://websec.com/blog/hackerhalted-discount-code-for-nmap-6-network-exploration-and-security-auditing-cookbook/</guid><description>PacktPub created a special discount code for our friends from HackerHalted</description><pubDate>Fri, 14 Dec 2012 21:39:20 GMT</pubDate><category>Blog</category><category>Cookbook</category><category>Discount</category><category>HackerHalted</category><category>Network</category><category>Nmap</category><category>Security</category><category>Security Auditing</category><author>Websec Security Team</author></item><item><title>Backdoor In Optical Fiber Device Alcatel-Lucent</title><link>https://websec.com/blog/backdoor-in-Alcatel-Lucent/</link><guid isPermaLink="true">https://websec.com/blog/backdoor-in-Alcatel-Lucent/</guid><description>The newest optical fiber devices offered by the ISP Infinitum have a backdoor which allow for full administration of these devices. This backdoor account is hidden by nature and does not allow for the password to be changed.</description><pubDate>Sun, 02 Dec 2012 15:06:54 GMT</pubDate><category>Blog</category><category>Account</category><category>Alcatel</category><category>Backdoor</category><category>Fiber Optic</category><category>Hidden</category><category>Infinitum</category><category>Lucent</category><author>Websec Security Team</author></item><item><title>Mac2WepKey HHG5xx for iPhone</title><link>https://websec.com/blog/Mac2WepKey-HHG5xx-for-iPhone/</link><guid isPermaLink="true">https://websec.com/blog/Mac2WepKey-HHG5xx-for-iPhone/</guid><description>The famous app to obtain the default WiFi passwords for Huawei routers is now available for the iPhone iOS 5.</description><pubDate>Thu, 06 Sep 2012 14:34:52 GMT</pubDate><category>Blog</category><category>App</category><category>Default</category><category>Generator</category><category>Huawei</category><category>Iphone</category><category>Mac2wepkey</category><category>Rene De La Garza</category><category>iOS</category><author>Websec Security Team</author></item><item><title>Solutions for challenge 2B</title><link>https://websec.com/blog/solutions-challenge-2B/</link><guid isPermaLink="true">https://websec.com/blog/solutions-challenge-2B/</guid><description>A detailed explanation of the SQL Injection challenge 2B and the many solutions used to solve this challenge.</description><pubDate>Wed, 22 Aug 2012 12:45:32 GMT</pubDate><category>Blog</category><category>2B</category><category>Challenge</category><category>Injection</category><category>SQL</category><category>Solution</category><author>Websec Security Team</author></item><item><title>Solutions for challenge 2A</title><link>https://websec.com/blog/solutions-challenge-2A/</link><guid isPermaLink="true">https://websec.com/blog/solutions-challenge-2A/</guid><description>A detailed explanation of the SQL Injection challenge 2A and the many solutions used to solve this challenge.</description><pubDate>Sat, 14 Jul 2012 14:10:13 GMT</pubDate><category>Blog</category><category>2A</category><category>Challenge</category><category>Injection</category><category>SQL</category><category>Solution</category><author>Websec Security Team</author></item></channel></rss>