Why CISA is Warning CISOs About a Breach at Sisense

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) said today it is investigating a breach at business intelligence company Sisense, whose products are designed to allow companies to vie ...

Continue Reading
Improper handling of node names in JWT claims assertions in github.com/hashicorp/consul

HashiCorp Consul does not properly validate the node or segment names prior to interpolation and usage in JWT claim assertions with the auto config...Read More ...

Continue Reading
Security Bulletin: IBM WebSphere Application Server and IBM WebSphere Application Server Liberty are vulnerable to a denial of service due to jose4j (CVE-2023-51775)

Summary There is a vulnerability in the jose4j library used by IBM WebSphere Application Server traditional and used by the IBM WebSphere Application Server Liberty. Vulnerability Details ** CVEID: CV ...

Continue Reading
Fedora 39 : podman-tui (2024-22f1e313dd)

The remote Fedora 39 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2024-22f1e313dd advisory. jose is JavaScript module for JSON Object Signing ...

Continue Reading
Fedora 38 : podman-tui (2024-529fe8a802)

The remote Fedora 38 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2024-529fe8a802 advisory. jose is JavaScript module for JSON Object Signing ...

Continue Reading
CVE-2024-31033

JJWT (aka Java JWT) through 0.12.5 ignores certain characters and thus a user might falsely conclude that they have a strong key. The impacted code is the setSigningKey() method within the DefaultJwtP ...

Continue Reading
JJWT improperly generates signing keys

JJWT (aka Java JWT) through 0.12.5 ignores certain characters and thus a user might falsely conclude that they have a strong key. The impacted code is the setSigningKey() method within the DefaultJwtP ...

Continue Reading
JJWT improperly generates signing keys

JJWT (aka Java JWT) through 0.12.5 ignores certain characters and thus a user might falsely conclude that they have a strong key. The impacted code is the setSigningKey() method within the DefaultJwtP ...

Continue Reading

Back to Main

Subscribe for the latest news: