Dev Resource Hub
  • 🛠️Online Tools
  • 💻DevOps
  • 🥷Cybersecurity
  • 📟Embedded
  • 🤖AI
  • ⚙️System
  • 🗂️Software
  • 👤About
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms of Use
  • English
    • 中文 (中国)
    • English
  • 🛠️Online Tools
  • 💻DevOps
  • 🥷Cybersecurity
  • 📟Embedded
  • 🤖AI
  • ⚙️System
  • 🗂️Software
  • 👤About
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms of Use
  • English
    • 中文 (中国)
    • English
  1. Home
  2. Tag
  3. Deserialization
Deep Dive into Fastjson Deserialization Vulnerabilities: From Principles to Practical Defense

Cybersecurity Deep Dive into Fastjson Deserialization Vulnerabilities: From Principles to Practical Defense

As one of the most widely used JSON parsing libraries in the Java ecosystem, Fastjson is favored for its high performance. However, its deserialization vulnerabilities—especially CVE-2022-25845—have repeatedly led to large-scale security incidents. Attackers only need to construct malicious JSON strings to achieve Remote Code Execution (RCE) and take full control of servers. This article breaks…

340 Views 0 Comments
Cybersecurity 2025-11-05
Search Article
Popular Articles
LangGraph Tutorial: Build an Enterprise-Grade Multi-Agent Intelligent Contract Review & Risk Analysis System (With HITL & Short/Long-Term Memory)

LangGraph Tutorial: Build an Enterprise-Grade Multi-Agent Intelligent Contract Review & Risk Analysis System (With HITL & Short/Long-Term Memory)

In enterprise operations, contract review is a core risk control process—but traditional manual review has long been plagued by three critical pain points: inefficiency (a complex contract can take hours or even days to review), risk omission (reliance on reviewer experience leads to missed hidden compliance issues), and lack of personalization (failure to adapt to...
CVE-2025-55182 Payload&Fix Guide: Complete Analysis & Mitigation for Next.js/React RSC Vulnerability (CVSS 10.0)

CVE-2025-55182 Payload&Fix Guide: Complete Analysis & Mitigation for Next.js/React RSC Vulnerability (CVSS 10.0)

In the early morning of December 4th, 2025, the global front-end developer community was rocked by an urgent security advisory—React officials confirmed a critical Remote Code Execution (RCE) vulnerability in React Server Components (RSC), tracked as CVE-2025-55182 (with Next.js-specific identifier CVE-2025-66478) and scoring a maximum CVSS 10.0. Following the 2021 Log4Shell vulnerability, this marks another...
Claude Code Router Tutorial: Low-Cost Multi-Model API Integration for Claude Code

Claude Code Router Tutorial: Low-Cost Multi-Model API Integration for Claude Code

If you’re a Claude Code user frustrated by the high API call costs of the official model, or want to try cost-effective code models like Kimi K2 and Qwen3-Coder without ditching your familiar Claude Code workflow—this article is exactly what you need. We’ll walk you through using Claude Code Router to connect Claude Code with...
JS Reverse Engineering Hook Guide: Locate Encrypted Parameters & Key Code Quickly

JS Reverse Engineering Hook Guide: Locate Encrypted Parameters & Key Code Quickly

In JS reverse engineering, the most time-consuming tasks are often locating where encrypted parameters are generated and tracking dynamic code execution. Whether it’s Authorization in request headers, Tokens in Cookies, or encrypted data transmitted via WebSocket, Hook technique is the “sharp tool” to solve these problems. This article compiles practical scripts for 6 high-frequency Hook...
Complete Guide to Tampermonkey: Tips & Greasyfork Resource Analysis

Complete Guide to Tampermonkey: Tips & Greasyfork Resource Analysis

After using a browser for a long time, you’ll inevitably encounter pain points: pop-up ads keep popping up, repetitive forms make your hands sore, and your favorite website layout doesn’t fit your reading habits… In fact, all these problems can be easily solved with user scripts. To master user scripts, you need to grasp two...
About us

About Us | Contact Us | Privacy Policy | Terms of Use X (Twitter)