The RCE bug affects versions below 4.4 of the Slack desktop app. A critical vulnerability in the popular Slack collaboration app would allow remote code-execution (RCE). Attackers could gain full ...
Qualys said the vuln gives any local user root access to systems running the most popular version of Sudo. A doozy of a bug that could allow any local user on most Linux or Unix systems to gain root ...
It's a Friday, people, which means there's more bad news from Facebook. Facebook disclosed a data breach on Friday that affected 6.8 million users. The trouble once again came from the connectivity of ...
U.S. power and electronics giant Eaton has fixed a security vulnerability that allowed a security researcher to remotely access thousands of smart security alarm systems. Security researcher Vangelis ...
Software King of the World, Microsoft has warned that the Direct Access feature in Windows 10 and 11 might bork if the user temporarily loses network connectivity or transitioning between Wi-Fi ...
Google seems to have fixed a bug with inviting others to access your Google Ads account. This bug appeared about a week ago and it Google seemed to start to roll out a fix for this bug on late Friday.
A bug in Windows 10 allowed UWP apps (Universal Windows Platform) to have access to the entire file system in Windows without permission from the user. This could have allowed a malicious app to ...
A nasty Skype bug could allow a malicious attacker to gain “system” level access, if exploited. The bug is applicable on both macOS and Windows desktop platforms. However, Microsoft says that fixing ...
Google has an internal platform called Google Issue Tracker that tracks a list of bugs and unpatched vulnerabilities, but that platform itself had a bug that allowed one security researcher to access ...
A sudo bug that can grant an attacker root access has been discovered to affect macOS Big Sur (via ZDNet). The security vulnerability, identified last week as "CVE-2021-3156" by the Qualys Security ...
The results could be catastrophic if malicious hackers were to access this database. Tech companies typically have a long list of bugs that need to be fixed, and a system that engineers can use to ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results