hippo4j 1.0.0 to 1.5.0, uses a hard-coded secret key in its JWT (JSON Web Token) creation. This allows attackers with access to the source code or compiled binary to forge valid access tokens and impe ...
Continue ReadingAugust 23, 2025
The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available. OpenNebula Community Edition (CE) before 7.0.0 and Enterprise Ed ...
Continue ReadingAugust 23, 2025
hippo4j 1.0.0 to 1.5.0, uses a hard-coded secret key in its JWT (JSON Web Token) creation. This allows attackers with access to the source code or compiled binary to forge valid access tokens and impe ...
Continue ReadingAugust 23, 2025
hippo4j 1.0.0 to 1.5.0, uses a hard-coded secret key in its JWT (JSON Web Token) creation. This allows attackers with access to the source code or compiled binary to forge valid access tokens and impe ...
Continue ReadingAugust 23, 2025
hippo4j 1.0.0 to 1.5.0, uses a hard-coded secret key in its JWT (JSON Web Token) creation. This allows attackers with access to the source code or compiled binary to forge valid access tokens and impe ...
Continue ReadingAugust 23, 2025
Name of the Vulnerable Software and Affected Versions: hippo4j versions 1.0.0 through 1.5.0 Description: hippo4j uses a hard-coded secret key in its JWT (JSON Web Token) creation. This allows attacker ...
Continue ReadingAugust 23, 2025
Vulnerability of parse.ParseUnverified() function of golang-jwt web token library of Go programming language is related to uncontrolled resource consumption. Go programming language is related to unco ...
Continue ReadingAugust 23, 2025
The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available. ruby-jwt v3.0.0.beta1 was discovered to contain weak encryption. ...
Continue ReadingAugust 23, 2025
Back to Main