wiz.io
Resources curated from this publisher and indexed across appsec.fyi topic pages. Last item added: 2026-04-22.
XSS 12
Supply Chain 6
RCE 4
SSRF 4
API Sec 2
AuthZ 2
AuthN 1
Bug Bounty 1
GraphQL 1
OSINT 1
Secrets 1
| Date Added | Resource | Excerpt |
|---|---|---|
| 2026-04-22 2026 | GitHub Actions Security Pt 1: Attacks & Defenses (Wiz)Supply Chain | GitHub Actions Security Pt 1: Attacks & Defenses (Wiz) |
| 2026-04-16 2026 | SSRF Vulnerability on Major Gaming Company (Wiz Bug Bounty)SSRF | SSRF Vulnerability on Major Gaming Company (Wiz Bug Bounty) |
| 2026-04-16 2026 | React2Shell Deep Dive: CVE-2025-55182 Exploit MechanicsRCE | React2Shell Deep Dive: CVE-2025-55182 Exploit Mechanics |
| 2026-04-11 2026 | npm Supply Chain Attack: debug, chalk, and BeyondSupply Chain | npm Supply Chain Attack: debug, chalk, and Beyond |
| 2026-04-11 2026 | s1ngularity: Nx supply chain attack leaks secretsSupply Chain | s1ngularity: Nx supply chain attack leaks secrets |
| 2026-04-11 2026 | tj-actions/changed-files supply chain attackSupply Chain | tj-actions/changed-files supply chain attack |
| 2026-04-11 2026 | Shai-Hulud 2.0: 25K+ Repos ExposedSupply Chain | Shai-Hulud 2.0: 25K+ Repos Exposed |
| 2026-04-11 2026 | What is Open Policy Agent (OPA)?AuthZ | What is Open Policy Agent (OPA)? |
| 2026-04-11 2026 | Kubernetes RBAC Best PracticesAuthZ | Kubernetes RBAC Best Practices |
| 2026-04-11 2026 | CVE-2025-47275: Auth0-PHP SDK CriticalAuthN | CVE-2025-47275: Auth0-PHP SDK Critical |
| 2026-04-10 2026 | OWASP API Security Top 10 RisksAPI Sec | OWASP API Security Top 10 Risks |
| 2026-04-10 2026 | 9 Top OSINT Tools & How to Evaluate ThemOSINT | 9 Top OSINT Tools & How to Evaluate Them |
| 2026-04-10 2026 | GraphQL API Security Risks Every Developer Should KnowGraphQL | GraphQL API Security Risks Every Developer Should Know |
| 2026-04-10 2026 | Critical Redis RCE Vulnerability: CVE-2025-49844RCE | Critical Redis RCE Vulnerability: CVE-2025-49844 |
| 2026-04-10 2026 | Ivanti EPMM RCE Vulnerability Chain Exploited in the WildRCE | Ivanti EPMM RCE Vulnerability Chain Exploited in the Wild |
| 2026-04-10 2026 | Gogs Zero-Day RCE (CVE-2025-8110) Actively ExploitedRCE | Gogs Zero-Day RCE (CVE-2025-8110) Actively Exploited |
| 2026-04-06 2026 | Secure Code Scanning: Basics & Best PracticesSecrets | Secure Code Scanning: Basics & Best Practices https://ift.tt/prJR9va |
| 2026-04-03 2026 | API management: Fundamentals for cloud security teamsAPI Sec | API management: Fundamentals for cloud security teams https://ift.tt/tDPnlvu |
| 2026-04-03 2026 | Axios NPM Distribution Compromised in Supply Chain AttackSupply Chain | Axios NPM Distribution Compromised in Supply Chain Attack https://ift.tt/5xM0Vni |
| 2026-03-01 2026 | Server-Side Request Forgery: What It Is & How To Fix It | WizSSRF | Server-Side Request Forgery: What It Is & How To Fix It | Wiz |
| 2026-01-22 2026 | Bug Bounty Masterclass | WizBug Bounty | Learn the fundamentals of bug bounty hunting and earn your certificate by solving hands-on challenges. |
| 2026-01-01 2026 | CVE-2025-23469 Impact Exploitability and Mitigation StepsXSS | The content discusses the CVE-2025-23469 vulnerability, focusing on its impact, exploitability, and mitigation steps. It provides insights into the potential consequences of the vulnerability, the likelihood of it being exploited, and steps that can be taken to mitigate the risks associated with it. The link provided directs to further details on the vulnerability in the Wiz vulnerability database. |
| 2025-11-10 2025 | CVE-2025-31029 Impact Exploitability and Mitigation StepsXSS | The content discusses the CVE-2025-31029 vulnerability, detailing its impact, exploitability, and mitigation steps. For more information, visit https://www.wiz.io/vulnerability-database/cve/cve-2025-31029. |
| 2025-11-10 2025 | CVE-2024-13992 Impact Exploitability and Mitigation StepsXSS | The content discusses CVE-2024-13992, detailing its impact, exploitability, and mitigation steps. It provides information on the vulnerability, its potential consequences, how it can be exploited, and steps to mitigate its risks. The link directs to further details on the vulnerability in a vulnerability database. |
| 2025-11-10 2025 | CVE-2013-10074 Impact Exploitability and Mitigation StepsXSS | The content discusses CVE-2013-10074, focusing on its impact, exploitability, and mitigation steps. It provides information on the vulnerability, its potential consequences, how it can be exploited, and steps to mitigate the risks associated with it. The link provided directs to further details about CVE-2013-10074. |
| 2025-11-10 2025 | CVE-2024-13993 Impact Exploitability and Mitigation StepsXSS | The content discusses CVE-2024-13993, focusing on its impact, exploitability, and mitigation steps. It provides information on the vulnerability, its potential consequences, the likelihood of exploitation, and steps to mitigate the risks associated with it. The link directs to further details on this specific CVE entry. |
| 2025-11-10 2025 | CVE-2018-25119 Impact Exploitability and Mitigation StepsXSS | The content discusses CVE-2018-25119, focusing on its impact, exploitability, and mitigation steps. It provides information on the vulnerability, its potential consequences, the likelihood of exploitation, and steps to mitigate the risk associated with it. The link directs to further details on the vulnerability in the wiz.io vulnerability database. |
| 2025-11-10 2025 | CVE-2021-47689 Impact Exploitability and Mitigation StepsXSS | The content discusses CVE-2021-47689, detailing its impact, exploitability, and mitigation steps. It provides information on the vulnerability, its potential consequences, how it can be exploited, and steps to mitigate the risks associated with it. The link provided likely offers further details on CVE-2021-47689, including specific information on the vulnerability and steps to address it effectively. |
| 2025-11-10 2025 | CVE-2025-62076 Impact Exploitability and Mitigation StepsXSS | The content discusses CVE-2025-62076, focusing on its impact, exploitability, and mitigation steps. It provides information on the vulnerability, its potential consequences, how it can be exploited, and steps to mitigate the risks associated with it. The link directs to further details on the vulnerability in the Wiz vulnerability database. |
| 2025-11-10 2025 | CVE-2025-62030 Impact Exploitability and Mitigation StepsXSS | The content discusses CVE-2025-62030, focusing on its impact, exploitability, and mitigation steps. It provides information on the vulnerability, its potential consequences, how it can be exploited, and steps to mitigate the risks associated with it. The link directs to further details on the vulnerability in the Wiz vulnerability database. |
| 2025-11-10 2025 | CVE-2025-59556 Impact Exploitability and Mitigation StepsXSS | The content discusses CVE-2025-59556, detailing its impact, exploitability, and mitigation steps. It provides information on the vulnerability and steps to mitigate its risks. The link directs to further details on the vulnerability in the wiz.io vulnerability database. |
| 2025-11-10 2025 | CVE-2025-62036 Impact Exploitability and Mitigation StepsXSS | The content discusses the impact, exploitability, and mitigation steps related to CVE-2025-62036. It provides information on the vulnerability, its potential consequences, how it can be exploited, and steps to mitigate the risks associated with it. The link directs to a website that likely contains detailed information about the CVE-2025-62036 vulnerability, including its severity, affected systems, and recommended actions to address the issue. |
| 2025-11-06 2025 | CVE-2025-31366 Impact Exploitability and Mitigation StepsXSS | The content discusses CVE-2025-31366, focusing on its impact, exploitability, and mitigation steps. It provides information on the vulnerability, its potential consequences, how it can be exploited, and steps to mitigate its risks. The link directs to further details on the vulnerability in a vulnerability database. |
| 2025-09-26 2025 | IMDS Abused: Hunting Rare Behaviors to Uncover ExploitsSSRF | The article discusses how attackers exploit vulnerabilities in the IMDS (Instance Metadata Service) by hunting for rare behaviors to uncover exploits. By analyzing unusual patterns and behaviors in IMDS usage, security researchers can detect potential threats and zero-day vulnerabilities. The focus is on understanding how attackers abuse IMDS to gain unauthorized access and compromise systems. The article emphasizes the importance of proactive monitoring and anomaly detection to protect against such attacks and prevent security breaches. |
| 2025-09-15 2025 | Server-Side Request Forgery: What It Is & How To Fix ItSSRF | The content discusses Server-Side Request Forgery (SSRF), explaining what it is and providing solutions to fix it. SSRF is a vulnerability that allows attackers to make requests on behalf of the server, potentially leading to data breaches or unauthorized access. The article likely covers the importance of understanding and mitigating SSRF risks to protect servers and sensitive data. It may also offer guidance on implementing security measures to prevent SSRF attacks, safeguarding systems from exploitation. For detailed information, visit the provided link: https://www.wiz.io/academy/server-side-request-forgery. |