{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreib33chagyuke5f3co5k5qskobozp2e37lgf6gb5qbg5nswtb3tc6u",
"uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mm7fse3mdtf2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreihihl546rf42cuqf3jhs7jiokoo523egyljdjhj4dremqh3rksvfi"
},
"mimeType": "image/webp",
"size": 15636
},
"path": "/amazon-redshift-jdbc-driver-vulnerability-allows-code-execution-through-connection-urls/",
"publishedAt": "2026-05-18T19:14:18.000Z",
"site": "https://vpncentral.com",
"tags": [
"News",
"Amazon Redshift JDBC Driver Vulnerability Allows Code Execution Through Connection URLs",
"VPN Central"
],
"textContent": "A newly disclosed Amazon Redshift JDBC Driver vulnerability can let attackers execute code inside vulnerable Java applications if they can influence database connection URLs. The flaw is tracked as CVE-2026-8178 and affects Amazon Redshift JDBC Driver versions before 2.2.2. AWS has fixed the issue, and organizations should upgrade to version 2.2.2 or later, preferably the […]\n\nThe post Amazon Redshift JDBC Driver Vulnerability Allows Code Execution Through Connection URLs appeared first on VPN Central.",
"title": "Amazon Redshift JDBC Driver Vulnerability Allows Code Execution Through Connection URLs"
}