Los ataques de phishing de tokens se multiplican a medida se propagan nuevos kits
Los ataques de phishing mediante código de dispositivo que abusan del flujo de
autorización de dispositivos OAuth 2.0 para secuestrar cuentas se han
multiplicado por más de 37 este año. En este ti...
Related Vulnerabilities
- CVE-2026-35594: Vikunja: Link Share JWT tokens remain valid for 72 hours after share deletion or permission downgrad MEDIUM
- CVE-2026-33707: Chamilo LMS is a learning management system. Prior to 1.11.38 and 2.0.0-RC.3, the default password r CRITICAL
- CVE-2026-40103: Vikunja: Scoped API tokens with projects.background permission can delete project backgrounds MEDIUM
- CVE-2026-5774: Improper synchronization of the userTokens map in the API server in Canonical Juju 4.0.5, 3.6.20, an MEDIUM
- CVE-2026-5483: A flaw was found in odh-dashboard in Red Hat Openshift AI. This vulnerability in the `odh-dashboard` HIGH
Related Coverage
Threat Actors