Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/45/1b/5f/451b5f2c-b1cb-bf09-2254-7dd041bddb29/mza_8870305144162640913.jpg/600x600bb.jpg
The Exploit Podcast: CVEs and Security News
SecurityPod
9 episodes
1 week ago
Stay updated with the most critical vulnerabilities of the week. In each episode, we analyze major CVEs, what caused them, their impact and mitigation strategies - helping security professionals and enthusiasts stay ahead of threats.
Show more...
Tech News
News
RSS
All content for The Exploit Podcast: CVEs and Security News is the property of SecurityPod and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Stay updated with the most critical vulnerabilities of the week. In each episode, we analyze major CVEs, what caused them, their impact and mitigation strategies - helping security professionals and enthusiasts stay ahead of threats.
Show more...
Tech News
News
Episodes (9/9)
The Exploit Podcast: CVEs and Security News
Camera Hijack on Unifi Protect, Dylib Hijacking in Davinci Resolve, Non-deterministic Deserialization in IBC-go, Authentication Bypass in CyberArk, RCE in Uniguest Tripleplay and more

Week ending 6th March 2025. Get ready for a deep dive into a newly released batch of critical security advisories. We're breaking down dozens of high-severity vulnerabilities affecting everything from WordPress themes and plugins to enterprise solutions like Vasion Print and UniFi Protect. Learn about the attack vectors, including remote code execution, authentication bypasses, and the ever-present SQL injection, and understand the potential impact on your data and infrastructure. This episode is your guide to understanding and mitigating these urgent threats.

Show more...
8 months ago
28 minutes 46 seconds

The Exploit Podcast: CVEs and Security News
JWT Validation Failure In Jupyter Hub, Arbitrary File Upload and SQL Injection in Mattermost, Path Traversal File Deletion in Mautic, Desrialization Of Untrusted Data in MetaSlider and more

Week ending 27th Feb, 2025.

Key vulnerabilities to be discussed include:

  • JWT Validation Failure in JupyterHub
  • Arbitrary File Upload and SQL Injection in Mattermost, where versions of Mattermost are failing to properly validate board blocks when importing boards and failing to use prepared statements in SQL queries
  • Path Traversal File Deletion in Mautic, where improper handling of path components allows authenticated users to manipulate file deletion processes
  • Deserialization of Untrusted Data in MetaSlider, potentially leading to object injection

The podcast will also cover unrestricted file uploads, authentication bypasses, and SQL injection flaws in systems like GreaterWMS, Everest Forms, XOne Web Monitor and Tenda routers.

Show more...
8 months ago
18 minutes 42 seconds

The Exploit Podcast: CVEs and Security News
Integer Overflow in Mercedes-Benz, RCE via Deserialization in Apache Ignite, Improper Authentication in Orca HCM, Plaintext Password in Netgear C7800 and more

Week ending 20th Feb. The Exploit Podcast dives deep into the week's most critical vulnerabilities affecting software, hardware, and web applications. Host and Principal Security Architect dissect real-world security challenges, from a sensitive information leak in a popular WordPress plugin (Oliver POS) to SAML signature bypasses in the CIE authentication library, command injection in Widget Options, and authentication flaws in TP-Link and D-Link routers. This episode highlights the importance of input validation, robust authentication, and staying vigilant in the face of ever-evolving threats. Perfect for engineers and security researchers looking to stay informed.

Show more...
8 months ago
30 minutes 3 seconds

The Exploit Podcast: CVEs and Security News
Remote code execution via Prompt Injection in PandasAI, Unverified password change vulnerability in Janto, Private Key Extraction in Elliptic (JS) and Regex Denial of Service in Koa and more

Week ending 13th Feb 2025. Get ready for another intense week in cybersecurity! This week, we're diving deep into a fresh batch of critical vulnerabilities hitting everything from WordPress plugins to enterprise software. We'll uncover flaws that could let attackers remotely hijack your systems, steal your data, or even take over entire networks. From privilege escalation in popular WordPress plugins that leave sites wide open to unauthenticated attackers, to a critical vulnerability in Elliptic that allows for private key extraction, we're breaking down the threats and what you can do to protect yourself. Don't miss this crucial update on the vulnerabilities that could be impacting you right now.

Show more...
8 months ago
26 minutes 20 seconds

The Exploit Podcast: CVEs and Security News
Django Unicorn Class Pollution, GeoTools XPath Manipulation, Eladmin CSV Injection, Zimbra SQL Injection, Woocomerce Taxi Booking Deserialization and more

Week 5 ending 6th Feb, 2025. In this episode, we dive deep into the latest security advisories, uncovering a surge of critical vulnerabilities affecting a wide range of software. From command injection flaws in EasyVirt DCScope and privilege escalation vulnerabilities due to weak encryption, to remote code execution exploits in Advantive VeraCore and ClassCMS, we break down the threats and their potential impact. We also discuss a concerning class pollution vulnerability in Django-Unicorn that can lead to XSS, DoS, and authentication bypass. Plus, we'll cover SQL injection flaws in Moss and Zimbra Collaboration, file upload vulnerabilities in ChestnutCMS, and memory corruption issues. Stay informed and learn how to protect your systems from these emerging threats!

Show more...
9 months ago
20 minutes 20 seconds

The Exploit Podcast: CVEs and Security News
Code Injection via UnTar in DJL, Header Bypass in ismp-grandpa, Arbitrary File Upload in Wordpress Plugin and more

A deep dive into the most critical security vulnerabilities reported in late January 2025. We cover everything from remote code execution flaws to SQL injections, and discuss the potential impact of these threats. These podcasts are auto-generated from the CVE feeds. Please use the information at your own risk.

Show more...
9 months ago
34 minutes 55 seconds

The Exploit Podcast: CVEs and Security News
Account Takeover in Wordpress Plugin, SQL Injection in APlus, SSRF in Apache Ranger UI and more

Week ending 23rd Jan. This week's security landscape is riddled with critical flaws across various platforms. We're seeing a surge in vulnerabilities stemming from inadequate input validation, leading to issues like privilege escalation and account takeovers in WordPress plugins. SQL Injection remains a prevalent threat, allowing attackers to manipulate databases, while arbitrary file upload vulnerabilities pose significant risks for remote code execution. We also have reports of operating system command injections and insecure deserialization of data, creating avenues for malicious attacks. Additionally, TLS certificate validation issues, logic errors, and insufficient permission assignments are all creating points of entry for bad actors. We're also seeing critical issues in enterprise products like Oracle and IBM, along with hardware like Lexmark printers and Newtec modems, showcasing that no type of system is safe from attack.

These podcasts are auto-generated from the CVE feeds. Please use the information at your own risk.

Show more...
9 months ago
22 minutes 57 seconds

The Exploit Podcast: CVEs and Security News
Search Injection in Mongoose, Insecure Serialization Rosa Open Source, XWiki Realtime Editor Privilege Escalation and more

Week ending 16th Jan. This podcast episode delves into recent critical software vulnerabilities, breaking down their technical details and real-world implications. Topics include server-side template injection (SSTI), OAuth nonce predictability, OS command injection, and file upload vulnerabilities. The discussion explores how attackers exploit these weaknesses, the potential impact on systems and users, and best practices for mitigation. Whether you're a cybersecurity professional or just interested in software security, this episode provides valuable insights into the latest threats and defense strategies.

These podcasts are auto-generated from the CVE feeds. Please use the information at your own risk.


Show more...
9 months ago
19 minutes 6 seconds

The Exploit Podcast: CVEs and Security News
OpenVPN Code Injection, go-git Command Injection, Perl OAuth Nonce Manipulation and more

Week ending 9th Jan. This episode dives into some of the most critical security vulnerabilities recently discovered. From web applications to network devices and authentication systems, we break down how these exploits work, their potential impact, and what can be done to mitigate them. Whether you're a security professional or just curious about the latest threats, this discussion will keep you informed. Stay ahead of the curve—tune in now!

These podcasts are auto-generated from the CVE feeds. Please use the information at your own risk.

Show more...
9 months ago
16 minutes 11 seconds

The Exploit Podcast: CVEs and Security News
Stay updated with the most critical vulnerabilities of the week. In each episode, we analyze major CVEs, what caused them, their impact and mitigation strategies - helping security professionals and enthusiasts stay ahead of threats.