[![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDIwzcZLeJuzWXppUYD064RlCGG9G9U2dQuxJNspnaX5IkUJYrTV9Q1tyOejKNEMT9Ch2nj1zOgvipfnS8aeGwvnbEsypqT16iKLA99igOo36scdZAxHTug93PD2iwzF2_igKCwe ...
Continue ReadingJune 23, 2022
Apache Dubbo prior to 2.6.9 and 2.7.10 by default supports generic calls to arbitrary methods exposed by provider interfaces. These invocations are handled by the GenericFilter which will find the ser ...
Continue ReadingJune 23, 2022
Just like everything else, the world of API protocols is evolving. Typical [SOAP]() and REST APIs have many companies like GraphQL, gRPC, and Thrift. JSON-RPC is also on the list. Created to develop f ...
Continue ReadingJune 23, 2022
**Historial API Evolution** As per the documented history, the occurrence of web APIs transpired towards the end of 1990 with the launch of Salesforces sales automation solution. At that point in ti ...
Continue ReadingJune 23, 2022
### API security Wiki: What is ? Why ? For PenTest & Best Practice **What does api mean?** For beginners, API refers to the Application Programming Interface designed for effortless communicati ...
Continue ReadingJune 23, 2022
### Impact _What kind of vulnerability is it? Who is impacted?_ Disclosed by Aapo Oksman (Senior Security Specialist, Nixu Corporation). > PyJWT supports multiple different JWT signing algorithms. ...
Continue ReadingJune 23, 2022
### Impact A critical vulnerability has been discovered in Argo CD which would allow unauthenticated users to impersonate as any Argo CD user or role, including the `admin` user, by sending a specific ...
Continue ReadingJune 23, 2022
### Impact A critical vulnerability has been discovered in Argo CD which would allow unauthenticated users to impersonate as any Argo CD user or role, including the `admin` user, by sending a specific ...
Continue ReadingJune 23, 2022
Back to Main