Tag: Vulnerabilities
You are here: Home \ Vulnerabilities \ Page 7
A Pinterest browser button leaks malformed code into any browser-based text editor.
Intel patches three flaws that could allow a local attacker to execute arbitrary code on impacted systems.
The flaw opened a hole in IBM’s serverless Cloud Functions platform, potentially exposing confidential customer data.
A high-severity flaw could result in attackers intercepting information, elevation of privilege and/or denial of service.
Oracle tackles a Solaris 10 and 11.3 vulnerability tied to 2009 patched bug.
The most recent Spectre-class flaw targets a component in CPUs called the return stack buffer.
These vulnerabilities have existed for over 20 years, and we are not even close to closing the door on these significant risks.
Ford, Toyota, GM and Tesla among car companies impacted by leaky backup service used by third-party firm.
Dasan and D-Link routers running GPON firmware are being targeted by hackers in an attempt to create a botnet.
Criminals have found a mischievous way to mine cryptocurrency. Security researcher Troy Mursch sounds off on why this tricky trend isn’t going away anytime soon.
... 34567891011 ... 18 ... 27 ... 36 ... 45 ... 54 ... 63 ... 72 ... 81 ... 90 ... 99 ... 108 ... 117 ... 126 ...