JWT Scan Rule
- Risk:
Medium
- Type:
- Active
- Summary
Scanner for finding vulnerabilities in JWT implementations.
- Solution
See reference for further information. The solution depends on implementation details
RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features
U.S. seized $8.2 million in crypto linked to 'Romance Baiting' scams
New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials
BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability
Retail giant Sam’s Club investigates Clop ransomware breach claims
Phishing-as-a-service operation uses DNS-over-HTTPS for evasion
New Ubuntu Linux security bypasses require manual mitigations
Oracle Health breach compromises patient data at US hospitals
Researchers Uncover 46 Critical Flaws in Solar Inverters From Sungrow, Growatt, and SMA
CVE-2020-29574 CyberoamOS (CROS) SQL Injection Vulnerability
CVE-2024-49035 Microsoft Partner Center Improper Access Control Vulnerability
CVE-2025-22224 VMware ESXi and Workstation TOCTOU Race Condition Vulnerability
CVE-2022-43939 Hitachi Vantara Pentaho BA Server Authorization Bypass Vulnerability
CVE-2024-20953 Oracle Agile Product Lifecycle Management (PLM) Deserialization Vulnerability
CVE-2018-8639 Microsoft Windows Win32k Improper Resource Shutdown or Release Vulnerability
CVE-2022-43769 Hitachi Vantara Pentaho BA Server Special Element Injection Vulnerability
CVE-2024-41710 Mitel SIP Phones Argument Injection Vulnerability
CVE-2025-0111 Palo Alto Networks PAN-OS File Read Vulnerability
CVE-2025-2783 Google Chromium Mojo Sandbox Escape Vulnerability
InformationalSec-Fetch-User Header Has an Invalid Value
InformationalCSP: Header & Meta
MediumBuffer Overflow
InformationalCross Site Scripting (Persistent) - Prime
HighSpring4Shell
InformationalSplit Viewstate in Use
InformationalStorable but Non-Cacheable Content
HighPath Traversal
Free online web security scanner