JSON Web Tokens (JWTs for short) are the new standard for transmitting identity information in the digital age. JWTs are JSON objects that act as an identifier for your user or application. Theyre u ...
Continue ReadingAugust 26, 2022
JSON Web Tokens (JWTs for short) are the new standard for transmitting identity information in the digital age. JWTs are JSON objects that act as an identifier for your user or application. Theyre u ...
Continue ReadingAugust 26, 2022
gravitee-gateway-core is vulnerable to path traversal. The vulnerability exists due to the lack of dynamic routing checks in the `selectUserDefinedEndpoint` function of `TargetEndpointResolver.java`, ...
Continue ReadingAugust 25, 2022
GNU SASL libgsasl server-side read-out-of-bounds with malicious authenticated GSS-API client. (CVE-2022-2469)Read More ...
Continue ReadingAugust 25, 2022
## Summary IBM Sterling Transformation Extender is impacted by Log4j2 security vulnerability, CVE-2021-44228, where an attacker can control log messages or log message parameters can execute arbitrary ...
Continue ReadingAugust 25, 2022
dotCMS ContentResource API contains an unrestricted upload of file with a dangerous type vulnerability that allows for directory traversal, in which the file is saved outside of the intended storage l ...
Continue ReadingAugust 25, 2022
php [7.4.19-4] - fix uninitialized array in pg_query_params() leading to RCE CVE-2022-31625Read More ...
Continue ReadingAugust 25, 2022
php [7.4.19-4] - fix uninitialized array in pg_query_params() leading to RCE CVE-2022-31625Read More ...
Continue ReadingAugust 25, 2022
Back to Main