Import tokens valid for one account may be used for any other account. Validation of Import token bindings incorrectly warns on mismatches, rather than rejecting the Goken. This permits a token for on ...
Continue ReadingJuly 01, 2022
The ScalarMult implementation of curve P-256 for amd64 architectures generates incorrect results for certain specific input points. An adaptive attack can progressively extract the scalar input to Sca ...
Continue ReadingJuly 01, 2022
A malicious account can create and sign a User JWT which causes a panic when decoded by the NATS JWT library.Read More ...
Continue ReadingJuly 01, 2022
The AuthenticateMethod authentication hook is not called for WebSocket connections, allowing unauthenticated access. This issue only affects WebSockets with an AuthenticateMethod hook. Request handler ...
Continue ReadingJuly 01, 2022
An issue in the /template/edit component of HongCMS v3.0 allows attackers to getshell.Read More ...
Continue ReadingJuly 01, 2022
JPEGOPTIM v1.4.7 was discovered to contain a segmentation violation which is caused by a READ memory access at jpegoptim.c.Read More ...
Continue ReadingJuly 01, 2022
An issue in the languages config file of HongCMS v3.0 allows attackers to getshell.Read More ...
Continue ReadingJuly 01, 2022
GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery v ...
Continue ReadingJuly 01, 2022
Back to Main