CBL Mariner 2.0 Security Update: application-gateway-kubernetes-ingress / azcopy / cert-manager / coredns / kubernetes (CVE-2025-30204)

The version of application-gateway-kubernetes-ingress / azcopy / cert-manager / coredns / kubernetes installed on the remote CBL Mariner 2.0 host is prior to tested version. It is, therefore, affected ...

Continue Reading
Out Of Memory Error

org.keycloak, keycloak-services is vulnerable to an Out Of Memory Error. The vulnerability is due to unbounded caching of JWT tokens with long expiration times, causing excessive memory consumption an ...

Continue Reading
Denial Of Service (DoS)

github.com/golang-jwt/jwt is vulnerable to Denial Of Service (DoS). The vulnerability is due to inefficient parsing of untrusted input in the ParseUnverified function, which splits tokens using string ...

Continue Reading
ROS-20250403-14

Vulnerability in the OpenSearch software package due to a problem in the implementation of Field Level Security (FLS). Field Level Security (FLS). Exploitation of the vulnerability could allow an atta ...

Continue Reading
CVE-2025-3177 FastCMS JWT hard-coded key

A vulnerability was found in FastCMS 0.1.5. It has been declared as critical. This vulnerability affects unknown code of the component JWT Handler. The manipulation leads to use of hard-coded cryptogr ...

Continue Reading
CVE-2025-3177

A vulnerability was found in FastCMS 0.1.5. It has been declared as critical. This vulnerability affects unknown code of the component JWT Handler. The manipulation leads to use of hard-coded cryptogr ...

Continue Reading
CVE-2025-3177 FastCMS JWT hard-coded key

A vulnerability was found in FastCMS 0.1.5. It has been declared as critical. This vulnerability affects unknown code of the component JWT Handler. The manipulation leads to use of hard-coded cryptogr ...

Continue Reading
CVE-2025-3177 FastCMS JWT hard-coded key

A vulnerability was found in FastCMS 0.1.5. It has been declared as critical. This vulnerability affects unknown code of the component JWT Handler. The manipulation leads to use of hard-coded cryptogr ...

Continue Reading

Back to Main

Subscribe for the latest news: