Tag: Vulnerabilities
You are here: Home \ Vulnerabilities \ Page 2
After Google publicized the flaw seven days after a patch was issued, the Epic Games CEO called out the company for irresponsible disclosure.
Researchers find proof-of-concept code that can take advantage of the recently identified Apache Struts framework (CVE-2018-11776) vulnerability.
The approach makes Mirai executable on a wide variety of disparate IoT devices and platforms from a single server.
T-Mobile alerts millions of its customers to a breach of its website that resulted in subscriber names, zip codes, phone numbers, email addresses and account numbers being stolen.
With the malicious code embedded into websites, the attacker can then piggyback on the trust level of the website and launch a variety of attacks.
Every minute, there are also 5,518 records leaked from publicly disclosed incidents.
Apache has patched a critical remote code-execution vulnerability in Struts 2, and users should update immediately.
Bridging the divide between hype and reality when it comes to what artificial intelligence and machine learning can do to help protect a business.
A remote, unauthenticated attacker could execute arbitrary commands on systems with the privileges of the Ghostscript code.
With an OS design based on a verified microkernel, researchers contend almost all Linux OS flaws could be mitigated to less than critical severity.
123456789 ... 18 ... 27 ... 36 ... 45 ... 54 ... 63 ... 72 ... 81 ... 90 ... 99 ... 108 ... 117 ... 126 ...