BeyondTrust has revealed it completed an investigation into a recent cybersecurity incident that targeted some of the company's Remote Support SaaS instances by making use of a compromised API key.
The company said the breach involved 17 Remote Support SaaS customers and that the API key was used to enable unauthorized access by resetting local application passwords. The breach was first flagged
A vulnerability was found in Apple visionOS. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to type confusion.
This vulnerability was named CVE-2025-24129. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Apple tvOS. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to type confusion.
The identification of this vulnerability is CVE-2025-24129. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Apple macOS. Affected is an unknown function. The manipulation leads to type confusion.
This vulnerability is traded as CVE-2025-24129. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Apple watchOS. Affected by this vulnerability is an unknown functionality. The manipulation leads to type confusion.
This vulnerability is known as CVE-2025-24129. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Apple iOS and iPadOS. Affected by this issue is some unknown functionality. The manipulation leads to type confusion.
This vulnerability is handled as CVE-2025-24129. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Software AG webMethods up to 10.15.0 Core_Fix6. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /WmAdmin/ of the component Administration Panel. The manipulation leads to empty password in configuration file.
This vulnerability is handled as CVE-2024-23733. The attack may be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability, which was classified as problematic, was found in Safety Production Process Management System 1.0. Affected is an unknown function. The manipulation of the argument number leads to information disclosure.
This vulnerability is traded as CVE-2024-57395. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability classified as critical has been found in Axiomatic Bento4. Affected is the function AP4_File::ParseStream of the component mp42avc. The manipulation leads to buffer overflow.
This vulnerability is traded as CVE-2024-57509. The attack needs to be approached locally. There is no exploit available.
A vulnerability classified as critical has been found in Apple macOS up to 15.2. This affects an unknown part of the component Kernel Memory Handler. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2025-24152. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
OpenAI's New Cost-Efficient AI Reasoning Model Excels in Math, Coding, and Science OpenAI has launched o3-mini, a high-performance AI model optimized for STEM tasks. The model offers enhanced reasoning abilities, reduced latency, and features like function calling and structured outputs. Available in ChatGPT and API, o3-mini surpasses its predecessor in coding and math accuracy.
A vulnerability, which was classified as problematic, has been found in OFFIS DCMTK 3.6.8. This issue affects the function DVPSSoftcopyVOI_PList::createFromImage. The manipulation leads to incorrect type conversion.
The identification of this vulnerability is CVE-2024-28130. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in DCMTK up to 3.6.8 and classified as critical. Affected by this issue is some unknown functionality of the component dcmdata. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2024-34509. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, was found in OFFIS DCMTK up to 3.6.6. This affects an unknown part of the component DICOM File Handler. The manipulation leads to null pointer dereference.
This vulnerability is uniquely identified as CVE-2022-2121. The attack needs to be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.