Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
CVE-2022-31781
Apache Tapestry is vulnerable to a denial of service, caused by a regular expression denial of service (ReDoS) flaw in the handling of Content Types. By sending a specially-crafted regex input using Content Types, a remote attacker could exploit this vulnerability to cause catastrophic backtracking, and results in a denial of service condition.
Apache
Apache Tapestry 5.8.1
Upgrade to the latest version of Apache Tapestry, available from the Apache Web site.