JWT tokens signed using NKeys for Ed25519 for the NATS ecosystem.Read More ...
Continue ReadingDecember 15, 2023
The D-Link D-View 8 web server running on the remote host uses a hard-coded key to protect a JWT token. An unauthenticated, remote attacker can exploit this, via a specially crafted message, to bypass ...
Continue ReadingDecember 15, 2023
The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2023:5485 advisory. - Versions of the package semver before 7 ...
Continue ReadingDecember 15, 2023
Multiple vulnerabilities in popular and widespread applications have been disclosed recently, tracked as [CVE-2023-36845](), [CVE-2023-40044](), [CVE-2023-42793](), [CVE-2023-29357](), and [CVE-2023-2 ...
Continue ReadingDecember 15, 2023
lamp-core and lamp-util are vulnerable to hard coded credential vulnerability. The vulnerability is due to usage of a hardcoded cryptographic key while creating and verifying a JWT token.The vulnerabi ...
Continue ReadingDecember 15, 2023
[]() While application development has evolved rapidly, the API man ...
Continue ReadingDecember 15, 2023
The remote Oracle Linux 9 host has a package installed that is affected by multiple vulnerabilities as referenced in the ELSA-2023-6420 advisory. Grafana is an open-source platform for monitoring an ...
Continue ReadingDecember 15, 2023
lamp-core and lamp-util are vulnerable to hard coded credential vulnerability. The vulnerability is due to usage of a hardcoded cryptographic key while creating and verifying a JWT token.The vulnerabi ...
Continue ReadingDecember 15, 2023
Back to Main