Tag
#auth
Improper Input Validation vulnerability in Apache DolphinScheduler. An authenticated user can cause arbitrary, unsandboxed javascript to be executed on the server. If you are using the switch task plugin, please upgrade to version 3.2.2.
Computer Laboratory Management version 1.0 suffers from a remote authenticated SQL injection vulnerability.
Courier Management System version 2020-1.0 suffers from multiple remote SQL injection vulnerabilities.
Backdoor.Win32.Nightmare.25 malware suffers from a code execution vulnerability.
Gas Agency Management version 2022 suffers from a cross site request forgery vulnerability.
Garden Gate version 2.6 suffers from a remote SQL injection vulnerability.
Gaati Track version 1.0-2023 suffers from an ignored default credential vulnerability.
Farmacia Gama version 1.0 suffers from an insecure direct object reference vulnerability.
Employee Management System version 1.0 suffers from an ignored default credential vulnerability.
In 2023, no fewer than 94 percent of businesses were impacted by phishing attacks, a 40 percent increase compared to the previous year, according to research from Egress. What's behind the surge in phishing? One popular answer is AI – particularly generative AI, which has made it trivially easier for threat actors to craft content that they can use in phishing campaigns, like malicious emails