Improper Authorization

next-auth is vulnerable to Improper Authorization. A malicious actor could create an empty/mock user by getting hold of a NextAuth.js-issued JWT from an interrupted OAuth sign-in flow (state, PKCE or ...

Continue Reading
WordPress UserPro 5.1.x Password Reset / Authentication Bypass / Escalation

...Read More ...

Continue Reading
Authentication Bypass

authentik is vulnerable to authentication bypass due to an insufficient PKCE check. The vulnerability is caused by code_verifier step during the OAUTH initialisation flow. Authentik improperly accepts ...

Continue Reading
Description of the security update for Microsoft Exchange Server 2016: November 14, 2023 (KB5032147)

None Notice See also KB 5032146 for additional information about issues that are fixed in this security update. This security update rollup resolves vulnerabilities in Microsoft Exchange Server. To ...

Continue Reading
Moderate: mod_auth_openidc:2.3 security and bug fix update

The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. ...

Continue Reading
CVE-2022-39222

A flaw was found in Dex, an identity service that uses OpenID Connect to drive authentication for other apps. This issue may allow an attacker to make a victim navigate to a malicious website and guid ...

Continue Reading
Apigee API Security policies howto

## The Genesis of Apigee API Security Guidelines In today's digital epoch, [APIs (Application Programming Interfaces)]( "APIs (Application Programming Interfaces)" ) have ascended to be the fundamenta ...

Continue Reading
Oracle Linux 8 : grafana (ELSA-2023-6972)

The remote Oracle Linux 8 host has a package installed that is affected by a vulnerability as referenced in the ELSA-2023-6972 advisory. Grafana is validating Azure AD accounts based on the email cla ...

Continue Reading

Back to Main

Subscribe for the latest news: