{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreib33chagyuke5f3co5k5qskobozp2e37lgf6gb5qbg5nswtb3tc6u",
    "uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mm7fse3mdtf2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreihihl546rf42cuqf3jhs7jiokoo523egyljdjhj4dremqh3rksvfi"
    },
    "mimeType": "image/webp",
    "size": 15636
  },
  "path": "/amazon-redshift-jdbc-driver-vulnerability-allows-code-execution-through-connection-urls/",
  "publishedAt": "2026-05-18T19:14:18.000Z",
  "site": "https://vpncentral.com",
  "tags": [
    "News",
    "Amazon Redshift JDBC Driver Vulnerability Allows Code Execution Through Connection URLs",
    "VPN Central"
  ],
  "textContent": "A newly disclosed Amazon Redshift JDBC Driver vulnerability can let attackers execute code inside vulnerable Java applications if they can influence database connection URLs. The flaw is tracked as CVE-2026-8178 and affects Amazon Redshift JDBC Driver versions before 2.2.2. AWS has fixed the issue, and organizations should upgrade to version 2.2.2 or later, preferably the […]\n\nThe post Amazon Redshift JDBC Driver Vulnerability Allows Code Execution Through Connection URLs appeared first on VPN Central.",
  "title": "Amazon Redshift JDBC Driver Vulnerability Allows Code Execution Through Connection URLs"
}