Linux Distros Unpatched Vulnerability : CVE-2021-3127

The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available. NATS Server 2.x before 2.2.0 and JWT library before 2.0.1 have I ...

Continue Reading
Linux Distros Unpatched Vulnerability : CVE-2019-1010263

The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available. Perl Crypt::JWT prior to 0.023 is affected by: Incorrect Access ...

Continue Reading
CVE-2025-41702

The JWT secret key is embedded in the egOS WebGUI backend and is readable to the default user. An unauthenticated remote attacker can generate valid HS256 tokens and bypass authentication/authorizatio ...

Continue Reading
CVE-2025-41702

The JWT secret key is embedded in the egOS WebGUI backend and is readable to the default user. An unauthenticated remote attacker can generate valid HS256 tokens and bypass authentication/authorizatio ...

Continue Reading
EUVD-2025-25832

The JWT secret key is embedded in the egOS WebGUI backend and is readable to the default user. An unauthenticated remote attacker can generate valid HS256 tokens and bypass authentication/authorizatio ...

Continue Reading
CVE-2025-41702 egOS WebGUI Hard-Coded JWT Secret Enables Authentication Bypass

The JWT secret key is embedded in the egOS WebGUI backend and is readable to the default user. An unauthenticated remote attacker can generate valid HS256 tokens and bypass authentication/authorizatio ...

Continue Reading
CVE-2025-41702 egOS WebGUI Hard-Coded JWT Secret Enables Authentication Bypass

The JWT secret key is embedded in the egOS WebGUI backend and is readable to the default user. An unauthenticated remote attacker can generate valid HS256 tokens and bypass authentication/authorizatio ...

Continue Reading
CVE-2025-30064 Possibility to generate a session for any user via the “ex:action” parameter after obtaining access to the JWT key

An insufficiently secured internal function allows session generation for arbitrary users. The decodeParam function checks the JWT but does not verify which signing algorithm was used. As a result, an ...

Continue Reading

Back to Main

Subscribe for the latest news: