Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. For a subset of unlikely rewrite rule configurations, it was possible for a specially crafted request to bypass some rewrite rules. If those rewrite rules effectively enforced security constraints, those constraints could be bypassed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.5, from 10.1.0-M1 through 10.1.39, from 9.0.0.M1 through 9.0.102. Users are recommended to upgrade to version [FIXED_VERSION], which fixes the issue.
#WEB3

Top auditors compete to keep high severity bugs out of production. Start a public or private audit within 48 hours.

Compete against the world's top crypto security experts and make a name for yourself.

On Immunefi, hackers secure web3, save funds from theft, and get paid the world's largest bug bounties.

The Ethernaut is a Web3/Solidity based wargame played in the Ethereum Virtual Machine. Each level is a smart contract that needs to be 'hacked'. The game is 100% open source and all levels are contributions made by other players.

Your one-stop-shop to learn all about Blockchain development and Crypto Technologies.

The Secure Smart Contract Development Roadmap. The essential blueprint for crafting secure protocols.

Guide to cryptocurrency scams. Protect your digital assets introduction.

Expert Bug Bounty Platform for Crypto Projects.

Learn to harness next-gen technologies to build the bridges that will lead us to a better tomorrow.

SecureWeb3 Academy offers online training courses to provide awareness of a range of web3 risks and threats and how to mitigate these. our training delivers the latest information and valuable insights to help you and your organisation navigate the emerging landscape of web3 technology with confidence.

Think out of the box. This blog talks about computer security. Tutorials about buffer overflow, Active Directory, everything is explained with examples.