Skip to Content
Cloud WAF Cloud WAF
  • Products
    • Cloud WAF
    • Kubernetes WAF
    • On Premises WAF
    • WAF API Gateway
    • Bot Protection
    • Layer 7 DDoS Protection
  • Solution
    • By Industry
      • E-Commerce
      • Healthcare
      • Education
      • Financial Services
    • By Cloud
      • Containers Service Mesh
      • Google Cloud
      • Microsoft Azure
      • AWS Waf
      • SaaS
      • Hybrid Cloud
      • Private Cloud
  • Partners
  • Customers
  • Pricing
  • About Us
    • OverView
      • About Us
      • Compliance
      • Pricing
      • Contact Us
    • Functional View
      • How it works
      • Integration
      • Why choose Us?
  • Resources
    • Case Studies
    • Blog
    • Common Vulnerabilities and Exposures
    • Learn Cyber Security
    • WAF Comparison
    • Documentation
Free Trial Free Trial
Free Trial
Web Application Firewall

Securing 3rd party API Integrations

When integrating with a third-party API, it's important to take security into consideration. Here are some key considerations to keep in mind: Authentication and Authorization:…

by Prophaze WAF March 3, 2023March 3, 2023
CVE-2023-26477 : XWIKI PRIOR 13.10.10/14.4.6/14.9-RC-1 REQUEST PARAMETER NEWTHEMENAME NEUTRALIZATION OF DIRECTIVES
Common Vulnerabilities and Exposures

CVE-2023-26477 : XWIKI PRIOR 13.10.10/14.4.6/14.9-RC-1 REQUEST PARAMETER NEWTHEMENAME NEUTRALIZATION OF DIRECTIVES

Description XWiki Platform is a generic wiki platform. Starting in versions 6.3-rc-1 and 6.2.4, it's possible to inject arbitrary wiki syntax including Groovy, Python and…

by cybersecurity insights March 3, 2023March 3, 2023
CVE-2023-0228 : ABB SYMPHONY PLUS S+ OPERATIONS UP TO 2.2/3.3 SP2 IMPROPER AUTHENTICATION
Common Vulnerabilities and Exposures

CVE-2023-0228 : ABB SYMPHONY PLUS S+ OPERATIONS UP TO 2.2/3.3 SP2 IMPROPER AUTHENTICATION

Description Improper Authentication vulnerability in ABB Symphony Plus S+ Operations allows Man in the Middle Attack. This issue affects Symphony Plus S+ Operations: from 2.X…

by cybersecurity insights March 2, 2023March 2, 2023
CVE-2023-0567 : PHP UP TO 8.0.27/8.1.15/8.2.2 BLOWFISH HASH PASSWORD_VERIFY UNKNOWN VULNERABILITY
Common Vulnerabilities and Exposures

CVE-2023-0567 : PHP UP TO 8.0.27/8.1.15/8.2.2 BLOWFISH HASH PASSWORD_VERIFY UNKNOWN VULNERABILITY

Description In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, password_verify() function may accept some invalid Blowfish hashes as valid. If such…

by cybersecurity insights March 1, 2023March 1, 2023
CVE-2022-45140 : WAGO COMPACT CONTROLLER CC100 WEB-BASED MANAGEMENT INTERFACE MISSING AUTHENTICATION
Common Vulnerabilities and Exposures

CVE-2022-45140 : WAGO COMPACT CONTROLLER CC100 WEB-BASED MANAGEMENT INTERFACE MISSING AUTHENTICATION

Description The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code…

by cybersecurity insights February 28, 2023February 28, 2023
CVE-2023-26605 : LINUX KERNEL 6.0.8 FS/FS-WRITEBACK.C INODE_CGWB_MOVE_TO_ATTACHED USE AFTER FREE
Common Vulnerabilities and Exposures

CVE-2023-26605 : LINUX KERNEL 6.0.8 FS/FS-WRITEBACK.C INODE_CGWB_MOVE_TO_ATTACHED USE AFTER FREE

Description In the Linux kernel 6.0.8, there is a use-after-free in inode_cgwb_move_to_attached in fs/fs-writeback.c, related to __list_del_entry_valid. References https://lkml.org/lkml/2023/2/22/3 For More Information MITRE

by cybersecurity insights February 27, 2023February 27, 2023
1 2 3 4 5 6 … 1,421

Why Prophaze ?
Request Demo

Questions
Partners
Privacy Policy
Terms of Service

Plans
WAF Pricing
Blog
CVEs
Case Studies
Make in India WAF
WAF Pricing
Free WAF
Webinar
System Status

Protection from all threats
DDoS protection
Automated security policy
AI firewall
Zero-configuration
Dashboard
API security
Compliance
Security updates
Virtual patching

Contact Us

Contact Prophaze Labs:

India : +91 7994 008 420

Email : security@prophaze.com

© 2023 Copyright © Prophaze Technologies Pvt. Ltd. All rights reserved. Terms & Conditions | Legal and Privacy | Manage Cookies