Data Center Security Privilege Escalation
Overview : Symantec Data Center Security Manager Component, prior to 6.8.2 (aka 6.8 MP2), may be susceptible to a privilege
Overview : Symantec Data Center Security Manager Component, prior to 6.8.2 (aka 6.8 MP2), may be susceptible to a privilege
The Evolving API Threat Landscape APIs have become the foundation of digital transformation, facilitating quick and scalable integration across various platforms.
Home What Is an API Data Breach? 1.3k Views 8 min. read Learning Center Related Content What Is Broken Authentication?
Introduction In the first half of April 2025, cybersecurity threats have escalated in both volume and complexity. From state-sponsored cyber
Overview : Privilege escalation vulnerability in MicroK8s allows a low privilege user with local access to obtain root access to
Overview : Elasticsearch versions from 6.7.0 to 6.8.7 and 7.0.0 to 7.6.1 contain a privilege escalation flaw if an attacker
Overview : Cisco Aironet Access Points Unauthorized Access Vulnerability CWE-284 / CVE-2019-15260 A vulnerability in Cisco Aironet Access Points (APs) Software could
Home How Do Hackers Bypass WAF? 8.2k Views 7 min. read Learning Center Related Content What Are Common WAF Limitations?
Home What Is API Injection? 4.2k Views 6 min. read Learning Center Related Content How Do APIs Get Hacked? What
Overview : In Argo versions prior to v1.5.0-rc1, it was possible for authenticated Argo users to submit API calls to
Overview : In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might
Overview : LogicalDoc before 8.3.3 allows SQL Injection. LogicalDoc populates the list of available documents by querying the database. This