The remote Debian 12 host has packages installed that are affected by a vulnerability as referenced in the dsa-5529 advisory. Note that Nessus has not tested for this issue but has instead relied only ...
Continue ReadingDecember 15, 2023
light-oauth2 before version 2.1.27 obtains the public key without any verification. This could allow attackers to authenticate to the application with a crafted JWT token.Read More ...
Continue ReadingDecember 15, 2023
The remote Oracle Linux 9 host has a package installed that is affected by multiple vulnerabilities as referenced in the ELSA-2023-6420 advisory. Grafana is an open-source platform for monitoring an ...
Continue ReadingDecember 15, 2023
neuvector is vulnerable to Authentication Bypass. An attacker can reverse engineer a JWT token, forging a valid taken to perform malicious activity. This can lead to RCE.Read More ...
Continue ReadingDecember 15, 2023
The D-Link D-View 8 web server running on the remote host uses a hard-coded key to protect a JWT token. An unauthenticated, remote attacker can exploit this, via a specially crafted message, to bypass ...
Continue ReadingDecember 15, 2023
[]() While application development has evolved rapidly, the API man ...
Continue ReadingDecember 15, 2023
Dromara Lamp-Cloud before v3.8.1 was discovered to use a hardcoded cryptographic key when creating and verifying a Json Web Token. This vulnerability allows attackers to authenticate to the applicatio ...
Continue ReadingDecember 15, 2023
json-web-token is vulnerable to Json Web Token (JWT) Bypass. The vulnerability is due to an insecure mechanism used while verifying the signature of a JWT. The library blindly trusts the algorithm lis ...
Continue ReadingDecember 15, 2023
Back to Main