A vulnerability was found in Jawn up to 1.3.0. It has been declared as problematic. This vulnerability affects the function objectContext
. Upgrading to version 1.3.1 eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
Jawn up to 1.3.0 objectContext resource consumption
- Virtual Patching
- January 6, 2022
- 8:10 am
CVE-2024-20418 : CISCO IOS XE CONTROLLER WEB-BASED MANAGEMENT INTERFACE COMMAND INJECTION
Description A vulnerability in the web-based management interface of Cisco Unified Industrial Wireless Software for Cisco Ultra-Reliable Wireless Backhaul (URWB)
CVE-2024-20536 : CISCO DATA CENTER NETWORK MANAGER 12.1.2E/12.1.2P/12.1.3B WEB-BASED MANAGEMENT INTERFACE/REST API ENDPOINT SQL INJECTION
Description A vulnerability in a REST API endpoint and web-based management interface of Cisco Nexus Dashboard Fabric Controller (NDFC) could
CVE-2024-50340 : SYMFONY INJECTION
Description symfony/runtime is a module for the Symphony PHP framework which enables decoupling PHP applications from global state. When the