Technical Details by Researcher is published here : https://link.medium.com/5Vi22ULA8xb

This is a complete detailed technical analysis of the CVE-2022-44877 with exploitation script and video explaining how to use the tool https://www.vicarius.io/vsociety/blog/unauthenticated-rce-in-centos-control-web-panel-7-cwp-cve-2022-44877 https://www.vicarius.io/vsociety/blog/unique-exploit-cve-2022-44877-exploitation-tool https://www.vicarius.io/vsociety/posts/1347

Advisory can be found at our website. (https://cyberdanube.com/en/en-authenticated-command-injection-in-hirschmann-belden-bat-c2/). The vulnerability was discovered with the help of our emulation framework MEDUSA

Advisory can be found at our website. (https://cyberdanube.com/en/en-multiple-vulnerabilities-in-delta-electronics-dx-2100-l1-cn/). The vulnerability was discovered with the help of our emulation framework MEDUSA

Advisory can be found at our website. (https://cyberdanube.com/en/en-multiple-vulnerabilities-in-delta-electronics-dx-2100-l1-cn/). The vulnerability was discovered with the help of our emulation framework MEDUSA

Advisory can be found over at our website. (https://cyberdanube.com/en/en-authenticated-command-injection-in-delta-electronics-dvw-w02w2-e2/) The vulnerability was discovered with the help of our emulation framework MEDUSA.

Technical Details by Researcher is published here: https://www.redinent.com/blog/critical-vulnerability-hikvision-wireless-bridge/

College Website CMS had an SQL injection into the department id parameter. discovered by Ayed Alqahtani (lus33r)

This vulnerability involves a rather unconventional vector for XSS - the comment field of an SSH public key. Since patched in newer versions of LuCI, which ensure to not display public key comments verbatim in order to prevent injection of any markup, including <script> tags.

The critical vulnerability was discovered by RedRays R&D center in SAP NetWeaver AS JAVA in ME module https://redrays.io/3242933-cve-2022-39802-file-path-traversal-vulnerability-in-sap-manufacturing-execution/