background graphic

Sysdig Site Search

Showing 41-50 of 166

Detecting the Kubernetes API server DoS vulnerability (CVE-2019-1002100).

Blog

Recently, a new Kubernetes related vulnerability was announced that affected the kube-apiserver. This was a denial of service vulnerability where...

CVE-2022-0185: Detecting and mitigating Linux Kernel vulnerability causing container escape

Blog

This week, Linux maintainers and vendors disclosed a heap overflow vulnerability in the Linux Kernel. The vulnerability has been issued...

Detecting jQuery File Upload vulnerability using Falco (CVE-2018-9206)

Blog

In the past few days, a new vulnerability was disclosed in a widely used component –  jQuery File Upload plugin....

CVE-2023-0210

Blog

Author: Hrvoje Mišetić KSMBD, as defined by the kernel documentation1, is a linux kernel server which implements SMB3 protocol in...

Detecting and Mitigating the “tj-actions/changed-files” Supply Chain Attack (CVE-2025-30066)

Blog

On March 14, 2025, StepSecurity uncovered a compromise in the popular GitHub Action tj-actions/changed-files. Tens of thousands of repositories use...

Critical vulnerability in log4j, a widely used logging library

Blog

Security researchers recently disclosed the vulnerability CVE-2021-44228 in Apache’s log4j, which is a common Java-based library used for logging purposes....

CVE-2025-32955: Security mechanism bypass in Harden-Runner Github Action

Blog

The Sysdig Threat Research Team (TRT) has discovered CVE-2025-32955, a now-patched vulnerability in Harden-Runner, one of the most popular GitHub...

Detecting and Mitigating Remote Code Execution Exploits in CUPS

Blog

What happened? On September 26th, 2024, details were released about several vulnerabilities in the Common Unix Printing System (CUPS) package....

Detecting ‘Leaky Vessels’ Exploitation in Docker and Kubernetes

Blog

Summary On January 31st 2024, Snyk announced the discovery of four vulnerabilities in Kubernetes and Docker.  For Kubernetes, the vulnerabilities...

The Power of Library-Based Vulnerability Detection

Blog

With an ever-growing number of vulnerabilities being discovered annually, vulnerability management tools are rapidly evolving to handle and prioritize these...

1 3 4 5 6 7 17

Stay up to date! Sign up to receive our newsletter.