Tag
#vulnerability
The bug affected accounts with 52-character user names, and had several pre-conditions that needed to be met in order to be exploited.
Companies are attaching the term "AI" to everything these days, but in cybersecurity, machine learning is more than hype.
As businesses worry over deepfake scams and other AI attacks, organizations are adding guidance for cybersecurity teams on how to detect, and respond to, next-generation threats. That includes Exabeam, which was recently targeted by a deepfaked job candidate.
Hackers claim to have breached MIT Technology Review Magazine via a third-party contractor, leaking nearly 300,000 user records…
An issue in the `createTempFile` method of hornetq v2.4.9 allows attackers to arbitrarily overwrite files or access sensitive information.
Sysax Multi Server version 6.9.9 suffers from an SSH related denial of service vulnerability.
Sysax Multi Server version 6.9.9 suffers from a cross site scripting vulnerability.
IBM Security Verify Access versions prior to 10.0.8 suffer from authentication bypass, reuse of private keys, local privilege escalation, weak settings, outdated libraries, missing password, hardcoded secrets, remote code execution, missing authentication, null pointer dereference, and lack of privilege separation vulnerabilities.
IBM Security Verify Access Appliance suffers from multiple insecure transit vulnerabilities, hardcoded passwords, and uninitialized variables. ibmsecurity versions prior to 2024.4.5 are affected.
ESET NOD32 Antivirus version 18.0.12.0 suffers from an unquoted service path vulnerability.