Komari vulnerable to Cross-site WebSocket Hijacking

Summary WebSocket upgrader has disabled origin checking, enabling Cross-Site WebSocket Hijacking (CSWSH) attacks against authenticated users Details https://github.com/komari-monitor/komari/blob/bd5a6 ...

Continue Reading
Linux Distros Unpatched Vulnerability : CVE-2021-42340

The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available. The fix for bug 63362 present in Apache Tomcat 10.1.0-M1 to 10.1 ...

Continue Reading
Linux Distros Unpatched Vulnerability : CVE-2025-32049

The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available. A flaw was found in libsoup. The SoupWebsocketConnection may acc ...

Continue Reading
Linux Distros Unpatched Vulnerability : CVE-2023-23602

The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available. A mishandled security check when creating a WebSocket in a WebWo ...

Continue Reading
Linux Distros Unpatched Vulnerability : CVE-2018-8034

The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available. The host name verification when using TLS with the WebSocket cli ...

Continue Reading
Linux Distros Unpatched Vulnerability : CVE-2022-25762

The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available. If a web application sends a WebSocket message concurrently with ...

Continue Reading
Linux Distros Unpatched Vulnerability : CVE-2025-5399

The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available. Due to a mistake in libcurl's WebSocket code, a malicious s ...

Continue Reading
Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft

Cybersecurity researchers have demonstrated an "end-to-end privilege escalation chain" in Amazon Elastic Container Service (ECS) that could be exploited by an attacker to conduct lat ...

Continue Reading

Back to Main

Subscribe for the latest news: