📦 Boundary
by Hashicorp
🔍 What is Boundary?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
Boundary and Boundary Enterprise are vulnerable to session hijacking through TLS certificate tampering. Attackers with specific privileges can craft TLS certificates to hijack active sessions and acce...