When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.

Per its site, it services more than 200 million users worldwide.

As it consists of multiple libraries, the vulnerabilities discovered were found in different components.

An abstract image of a cloud raining data.

The first one, CVE-2023-49103, can be abused to steal login data and configuration information in containerized deployments.

This flaw was given the maximum severity score - 10.

Let your people use the web freely without risking data and web link security.

Reader Offer: $50 Amazon gift card with demo

Preferred partner (What does this mean?)

All the attackers need is a username of a user that kept the default tweaks for the signing-key.

This flaw was given a rating of 9.8.

The third is the least severe of all, with a severity score of 9.

As a result, the hackers can redirect callbacks to a domain controlled by the attacker.

Hackers can abuse it steal data, engage inidentity theftand phishing, and more.

ViaBleepingComputer

More from TechRadar Pro