JWT token compromise can allow malicious actions including Remote Code Execution (RCE)

### Impact A user can reverse engineer the JWT token (JSON Web Token) used in authentication for Manager and API access, forging a valid NeuVector Token to perform malicious activity in NeuVector. Th ...

Continue Reading
[SECURITY] Fedora 39 Update: golang-github-nats-io-jwt-2-2.5.2-1.fc39

JWT tokens signed using NKeys for Ed25519 for the NATS ecosystem.Read More ...

Continue Reading
Dromara Lamp-Cloud Use of Hard-coded Cryptographic Key

Dromara Lamp-Cloud before v3.8.1 was discovered to use a hardcoded cryptographic key when creating and verifying a Json Web Token. This vulnerability allows attackers to authenticate to the applicatio ...

Continue Reading
CVE-2023-48309

NextAuth.js provides authentication for Next.js. next-auth applications prior to version 4.24.5 that rely on the default Middleware authorization are affected by a vulnerability. A bad actor could cre ...

Continue Reading
Possible user mocking that bypasses basic authentication

Impact next-auth applications prior to version 4.24.5 that rely on the default Middleware authorization are affected. A bad actor could create an empty/mock user, by getting hold of a NextAuth.js-issu ...

Continue Reading
[SECURITY] Fedora 39 Update: golang-github-nats-io-jwt-2-2.5.2-1.fc39

JWT tokens signed using NKeys for Ed25519 for the NATS ecosystem.Read More ...

Continue Reading
Use Of Hardcoded Cryptographic Key

lamp-core and lamp-util are vulnerable to hard coded credential vulnerability. The vulnerability is due to usage of a hardcoded cryptographic key while creating and verifying a JWT token.The vulnerabi ...

Continue Reading
CVE-2023-31579

Dromara Lamp-Cloud before v3.8.1 was discovered to use a hardcoded cryptographic key when creating and verifying a Json Web Token. This vulnerability allows attackers to authenticate to the applicatio ...

Continue Reading

Back to Main

Subscribe for the latest news: