CVE-2022-31173 Juniper is a GraphQL server library for Rust that is vulnerable to uncontrolled recursion that can lead to a program crash. Upgrading to version 0.15.10 is recommended.

CVE-2022-31173 Juniper is a GraphQL server library for Rust that is vulnerable to uncontrolled recursion that can lead to a program crash. Upgrading to version 0.15.10 is recommended.

All users advised to upgrade to version 0.15.10. Affected versions are Juniper, Juniper, Juniper (Juniper). This security advisory will be updated when more information is available.

CVE-2018-9158 The Juniper Juniper (Juniper) is a GraphQL server library for Rust. This vulnerability exists because of the lack of input validation within the code. An attacker can leverage this vulnerability to execute malicious code within the context of the affected application.

CVE-2018-9157 The Juniper Juniper (Juniper) is a GraphQL server library for Rust. This vulnerability exists because of the lack of input validation within the code. An attacker can leverage this vulnerability to execute malicious code within the context of the affected application.

CVE-2018-9156 The Juniper Juniper (Juniper) is a GraphQL server library for Rust. This vulnerability exists because of the lack of input validation within the code. An attacker can leverage this vulnerability to execute malicious code within the context of the affected application.

CVE-2018-9155 The Juniper Juniper (Juniper) is a GraphQL server library for Rust. This vulnerability exists because of the lack of input validation within the code. An attacker can leverage this vulnerability to execute malicious code within the context of the affected application.

CVE-2018-9154 The Juniper Juniper (Juniper) is a GraphQL server library for Rust. This

^

High Availability and Site-to-Site VPNs

Site-to-site virtual private networks (VPN) allow you to establish a secure connection between your on-premises network and the Internet. Virtual private networks are commonly used for high availability environments, but they can also be used to connect two sites over an untrusted network.

References

Subscribe to CVE.news
Don’t miss out on the latest issues. Sign up now to get access to the library of members-only issues.
jamie@example.com
Subscribe