CVE-2022-31669 - How Harbor’s Tag Immutability Policy Update Bug Can Let Attackers Alter Other Projects
When it comes to securing container images, Harbor is an open-source registry many organizations depend on for its advanced features, including tag immutability policies—rules
CVE-2022-31667 - How to Exploit Harbor's Robot Account Permission Bypass
> Exclusive Long Read: Understand and Exploit a Subtle but Serious Harbor Security Bug
What is Harbor?
Harbor is an open-source registry for storing, signing,
CVE-2022-31666 - Harbor Webhook Policy Permissions Flaw Explained & Exploited
Harbor is an open-source container image registry trusted by many organizations to safely store and manage their Docker images. In 2022, a critical security flaw—
CVE-2024-9693 - How a GitLab Kubernetes Agent Flaw Risked Your Cluster – Explained with Code and Exploit Details
In early 2024, GitLab disclosed a serious vulnerability (CVE-2024-9693) affecting its Community Edition (CE) and Enterprise Edition (EE) products. This vulnerability put countless Kubernetes clusters
CVE-2024-43093 - How Unicode Tricks Bypass Android’s Storage Protection
Security vulnerabilities in Android aren’t always about complex code—sometimes, it’s about tiny details, like how text is converted under the hood. CVE-2024-43093
Episode
00:00:00
00:00:00