CVE-2022-20652: Cisco Tetration Command Injection Vulnerability - Impact, Exploitation, and Mitigation
CVE-2022-20652 is a critical vulnerability in the web-based management interface and API subsystem of Cisco Tetration, which could allow an authenticated remote attacker to execute
CVE-2022-20853 - Cisco Expressway Series and TelePresence VCS: Cross-Site Request Forgery Vulnerability in REST API
A newly discovered vulnerability, identified as CVE-2022-20853, affects the REST API of Cisco Expressway Series and Cisco TelePresence VCS, which could potentially allow an unauthenticated
CVE-2024-10924: Authentication Bypass Vulnerability in Really Simple Security Plugins for WordPress
Really Simple Security plugins (Free, Pro, and Pro Multisite) are popular security plugins for WordPress. They help to secure your WordPress website with features such
CVE-2022-31671: Understanding & Mitigating Harbor's P2P Preheat Execution Logs Vulnerability
In this blog post, we are going to dig into a recently discovered vulnerability in Harbor's P2P preheat execution logs (CVE-2022-31671). Harbor, a
CVE-2022-31670: How Harbor's Lack of Permissions Validation Leaves Projects Vulnerable to Unauthorized Tag Retention Policy Updates
In a recently discovered vulnerability, harbor, a popular container image registry, fails to validate user permissions when updating tag retention policies, which could allow unauthorized
Episode
00:00:00
00:00:00