{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreicyaur6sjzkufjbgwvo32zxsx2whw3ntc2odldmcdjqclgo4frroa",
"uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mmgdn66rxq52"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreif4h45zykullfzy6ufjpxx6gm2wfd34l5u6nysjktdjo23xb2u4he"
},
"mimeType": "image/jpeg",
"size": 341819
},
"path": "/2026/05/cisco-patches-cvss-100-secure-workload.html",
"publishedAt": "2026-05-22T05:36:18.000Z",
"site": "https://thehackernews.com",
"textContent": "Cisco has rolled out updates for a maximum-severity security flaw impacting Secure Workload that could allow an unauthenticated, remote attacker to access sensitive data.\n\nTracked as CVE-2026-20223 (CVSS score: 10.0), the vulnerability arises from insufficient validation and authentication when accessing REST API endpoints.\n\n\"An attacker could exploit this vulnerability if they are able to send",
"title": "Cisco Patches CVSS 10.0 Secure Workload REST API Flaw Enabling Data Access"
}