A vulnerability was found in JWT up to 3.4.5/4.0.3/4.1.4. It has been classified as problematic. This affects some unknown processing of the component Token Handler. Upgrading to version 3.4.6, 4.0.4 or 4.1.5 eliminates this vulnerability. Applying the patch 8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73 is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
JWT up to 3.4.5/4.0.3/4.1.4 Token insufficient verification of data authenticity
- Virtual Patching
- September 29, 2021
- 8:04 am
CVE-2024-24856 : LINUX KERNEL UP TO 6.8 ACPI_ALLOCATE_ZEROED NULL POINTER DEREFERENCE
Description The memory allocation function ACPI_ALLOCATE_ZEROED does not guarantee a successful allocation, but the subsequent code directly dereferences the pointer
CVE-2024-2912 : BENTOML FRAMEWORK UP TO 1.2.4 POST REQUEST INSECURE DEFAULT INITIALIZATION OF RESOURCE
Description An insecure deserialization vulnerability exists in the BentoML framework, allowing remote code execution (RCE) by sending a specially crafted
CVE-2024-26817 : LINUX KERNEL UP TO 6.8.5 AMDKFD KZALLOC INTEGER OVERFLOW
Description In the Linux kernel, the following vulnerability has been resolved: amdkfd: use calloc instead of kzalloc to avoid integer