Deserialization of Untrusted Data in Apache Dubbo

Apache Dubbo prior to 2.6.9 and 2.7.10 by default supports generic calls to arbitrary methods exposed by provider interfaces. These invocations are handled by the GenericFilter which will find the ser ...

Continue Reading
What is JSON-RPC ? Definition, Work, Comparison

Just like everything else, the world of API protocols is evolving. Typical [SOAP]() and REST APIs have many companies like GraphQL, gRPC, and Thrift. JSON-RPC is also on the list. Created to develop f ...

Continue Reading
API Security Tutorial

**Historial API Evolution** As per the documented history, the occurrence of web APIs transpired towards the end of 1990 with the launch of Salesforce’s sales automation solution. At that point in ti ...

Continue Reading
API security?—?Wiki: What is ? Why ? For PenTest & Best Practice

### API security — Wiki: What is ? Why ? For PenTest & Best Practice **What does api mean?** For beginners, API refers to the Application Programming Interface designed for effortless communicati ...

Continue Reading
GitHub Security Lab: [Java]: CWE-321 – Query to detect hardcoded JWT secret keys

This bug was reported directly to GitHub Security Lab.Read More ...

Continue Reading
Uncontrolled Resource Consumption

# Description The Organizr application allows large characters to insert in the input field "Username" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. # Proof ...

Continue Reading
CVE-2022-29266

In APache APISIX before 3.13.1, an attacker can obtain a plugin-configured secret via an error message response by sending an incorrect JSON Web Token to a route protected by the jwt-auth plugin. The ...

Continue Reading
CVE-2022-24860

Databasir is a team-oriented relational database model document management platform. Databasir 1.01 has Use of Hard-coded Cryptographic Key vulnerability. An attacker can use hard coding to generate l ...

Continue Reading

Back to Main

Subscribe for the latest news: