appsec.fyi · Sources

wiz.io

35 curated AppSec resources from wiz.io across 11 topics on appsec.fyi.

wiz.io

Resources curated from this publisher and indexed across appsec.fyi topic pages. Last item added: 2026-04-22.

Date Added Resource Excerpt
2026-04-22 2026GitHub Actions Security Pt 1: Attacks & Defenses (Wiz)Supply ChainGitHub Actions Security Pt 1: Attacks & Defenses (Wiz)
2026-04-16 2026SSRF Vulnerability on Major Gaming Company (Wiz Bug Bounty)SSRFSSRF Vulnerability on Major Gaming Company (Wiz Bug Bounty)
2026-04-16 2026React2Shell Deep Dive: CVE-2025-55182 Exploit MechanicsRCEReact2Shell Deep Dive: CVE-2025-55182 Exploit Mechanics
2026-04-11 2026npm Supply Chain Attack: debug, chalk, and BeyondSupply Chainnpm Supply Chain Attack: debug, chalk, and Beyond
2026-04-11 2026s1ngularity: Nx supply chain attack leaks secretsSupply Chains1ngularity: Nx supply chain attack leaks secrets
2026-04-11 2026tj-actions/changed-files supply chain attackSupply Chaintj-actions/changed-files supply chain attack
2026-04-11 2026Shai-Hulud 2.0: 25K+ Repos ExposedSupply ChainShai-Hulud 2.0: 25K+ Repos Exposed
2026-04-11 2026What is Open Policy Agent (OPA)?AuthZWhat is Open Policy Agent (OPA)?
2026-04-11 2026Kubernetes RBAC Best PracticesAuthZKubernetes RBAC Best Practices
2026-04-11 2026CVE-2025-47275: Auth0-PHP SDK CriticalAuthNCVE-2025-47275: Auth0-PHP SDK Critical
2026-04-10 2026OWASP API Security Top 10 RisksAPI SecOWASP API Security Top 10 Risks
2026-04-10 20269 Top OSINT Tools & How to Evaluate ThemOSINT9 Top OSINT Tools & How to Evaluate Them
2026-04-10 2026GraphQL API Security Risks Every Developer Should KnowGraphQLGraphQL API Security Risks Every Developer Should Know
2026-04-10 2026Critical Redis RCE Vulnerability: CVE-2025-49844RCECritical Redis RCE Vulnerability: CVE-2025-49844
2026-04-10 2026Ivanti EPMM RCE Vulnerability Chain Exploited in the WildRCEIvanti EPMM RCE Vulnerability Chain Exploited in the Wild
2026-04-10 2026Gogs Zero-Day RCE (CVE-2025-8110) Actively ExploitedRCEGogs Zero-Day RCE (CVE-2025-8110) Actively Exploited
2026-04-06 2026Secure Code Scanning: Basics & Best PracticesSecretsSecure Code Scanning: Basics & Best Practices https://ift.tt/prJR9va
2026-04-03 2026API management: Fundamentals for cloud security teamsAPI SecAPI management: Fundamentals for cloud security teams https://ift.tt/tDPnlvu
2026-04-03 2026Axios NPM Distribution Compromised in Supply Chain AttackSupply ChainAxios NPM Distribution Compromised in Supply Chain Attack https://ift.tt/5xM0Vni
2026-03-01 2026Server-Side Request Forgery: What It Is & How To Fix It | WizSSRFServer-Side Request Forgery: What It Is & How To Fix It | Wiz
2026-01-22 2026Bug Bounty Masterclass | WizBug BountyLearn the fundamentals of bug bounty hunting and earn your certificate by solving hands-on challenges.
2026-01-01 2026CVE-2025-23469 Impact Exploitability and Mitigation StepsXSSThe content discusses the CVE-2025-23469 vulnerability, focusing on its impact, exploitability, and mitigation steps. It provides insights into the potential consequences of the vulnerability, the likelihood of it being exploited, and steps that can be taken to mitigate the risks associated with it. The link provided directs to further details on the vulnerability in the Wiz vulnerability database.
2025-11-10 2025CVE-2025-31029 Impact Exploitability and Mitigation StepsXSSThe content discusses the CVE-2025-31029 vulnerability, detailing its impact, exploitability, and mitigation steps. For more information, visit https://www.wiz.io/vulnerability-database/cve/cve-2025-31029.
2025-11-10 2025CVE-2024-13992 Impact Exploitability and Mitigation StepsXSSThe content discusses CVE-2024-13992, detailing its impact, exploitability, and mitigation steps. It provides information on the vulnerability, its potential consequences, how it can be exploited, and steps to mitigate its risks. The link directs to further details on the vulnerability in a vulnerability database.
2025-11-10 2025CVE-2013-10074 Impact Exploitability and Mitigation StepsXSSThe content discusses CVE-2013-10074, focusing on its impact, exploitability, and mitigation steps. It provides information on the vulnerability, its potential consequences, how it can be exploited, and steps to mitigate the risks associated with it. The link provided directs to further details about CVE-2013-10074.
2025-11-10 2025CVE-2024-13993 Impact Exploitability and Mitigation StepsXSSThe content discusses CVE-2024-13993, focusing on its impact, exploitability, and mitigation steps. It provides information on the vulnerability, its potential consequences, the likelihood of exploitation, and steps to mitigate the risks associated with it. The link directs to further details on this specific CVE entry.
2025-11-10 2025CVE-2018-25119 Impact Exploitability and Mitigation StepsXSSThe content discusses CVE-2018-25119, focusing on its impact, exploitability, and mitigation steps. It provides information on the vulnerability, its potential consequences, the likelihood of exploitation, and steps to mitigate the risk associated with it. The link directs to further details on the vulnerability in the wiz.io vulnerability database.
2025-11-10 2025CVE-2021-47689 Impact Exploitability and Mitigation StepsXSSThe content discusses CVE-2021-47689, detailing its impact, exploitability, and mitigation steps. It provides information on the vulnerability, its potential consequences, how it can be exploited, and steps to mitigate the risks associated with it. The link provided likely offers further details on CVE-2021-47689, including specific information on the vulnerability and steps to address it effectively.
2025-11-10 2025CVE-2025-62076 Impact Exploitability and Mitigation StepsXSSThe content discusses CVE-2025-62076, focusing on its impact, exploitability, and mitigation steps. It provides information on the vulnerability, its potential consequences, how it can be exploited, and steps to mitigate the risks associated with it. The link directs to further details on the vulnerability in the Wiz vulnerability database.
2025-11-10 2025CVE-2025-62030 Impact Exploitability and Mitigation StepsXSSThe content discusses CVE-2025-62030, focusing on its impact, exploitability, and mitigation steps. It provides information on the vulnerability, its potential consequences, how it can be exploited, and steps to mitigate the risks associated with it. The link directs to further details on the vulnerability in the Wiz vulnerability database.
2025-11-10 2025CVE-2025-59556 Impact Exploitability and Mitigation StepsXSSThe content discusses CVE-2025-59556, detailing its impact, exploitability, and mitigation steps. It provides information on the vulnerability and steps to mitigate its risks. The link directs to further details on the vulnerability in the wiz.io vulnerability database.
2025-11-10 2025CVE-2025-62036 Impact Exploitability and Mitigation StepsXSSThe content discusses the impact, exploitability, and mitigation steps related to CVE-2025-62036. It provides information on the vulnerability, its potential consequences, how it can be exploited, and steps to mitigate the risks associated with it. The link directs to a website that likely contains detailed information about the CVE-2025-62036 vulnerability, including its severity, affected systems, and recommended actions to address the issue.
2025-11-06 2025CVE-2025-31366 Impact Exploitability and Mitigation StepsXSSThe content discusses CVE-2025-31366, focusing on its impact, exploitability, and mitigation steps. It provides information on the vulnerability, its potential consequences, how it can be exploited, and steps to mitigate its risks. The link directs to further details on the vulnerability in a vulnerability database.
2025-09-26 2025IMDS Abused: Hunting Rare Behaviors to Uncover ExploitsSSRFThe article discusses how attackers exploit vulnerabilities in the IMDS (Instance Metadata Service) by hunting for rare behaviors to uncover exploits. By analyzing unusual patterns and behaviors in IMDS usage, security researchers can detect potential threats and zero-day vulnerabilities. The focus is on understanding how attackers abuse IMDS to gain unauthorized access and compromise systems. The article emphasizes the importance of proactive monitoring and anomaly detection to protect against such attacks and prevent security breaches.
2025-09-15 2025Server-Side Request Forgery: What It Is & How To Fix ItSSRFThe content discusses Server-Side Request Forgery (SSRF), explaining what it is and providing solutions to fix it. SSRF is a vulnerability that allows attackers to make requests on behalf of the server, potentially leading to data breaches or unauthorized access. The article likely covers the importance of understanding and mitigating SSRF risks to protect servers and sensitive data. It may also offer guidance on implementing security measures to prevent SSRF attacks, safeguarding systems from exploitation. For detailed information, visit the provided link: https://www.wiz.io/academy/server-side-request-forgery.