JSON Web Token Vulnerability

JSON Web Token Vulnerability

A security flaw with risk severity of high has been found in the popular JsonWebToken open-source JavaScript package. The attacker could perform RCE on a server verifying a maliciously crafted…
SQL Injection Using JSON

SQL Injection Using JSON

Security researchers have developed a generic SQL injection technique that bypasses multiple web application firewalls (WAFs). Allowing potential attackers to easily hide their malicious payloads.  Since the vendors are failing…