91精品在线观看国产-一级毛片免费看全集-三级黄日含免费的-欧美一级a做一级a做片性-黄色一级毛片黄片库-美国一级黄片操逼-免费二级毛片完整视频-国产精品久久久久久一级毛片男模-一级A做一级A做在线观看AV

【dungeon gay sex videos】Okta just fixed a very weird security bug for accounts with long usernames

【dungeon gay sex videos】Okta just fixed a very weird security bug for accounts with long usernames

Okta just squashed a particularly unusual bug in its software.

The dungeon gay sex videosdigital security management company posted a bug fix report to its website (as spotted by The Verge) letting users know that a glitch in the system that theoretically allowed bad actors to gain access to accounts had been ironed out. Sounds normal enough, right? Well, here's the kicker: The bug could've allowed someone to log into an account without entering the passwordas long as the username was 52 characters or longer.

Mashable Light Speed Want more out-of-this world tech, space and science stories? Sign up for Mashable's weekly Light Speed newsletter. By clicking Sign Me Up, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy. Thanks for signing up!
SEE ALSO: Largest U.S. healthcare data breach exposes medical records of 100 million customers

"During specific conditions, this could allow users to authenticate by only providing the username with the stored cache key of a previous successful authentication," Okta wrote.


You May Also Like

It should be re-emphasized that this is no longer a concern for Okta users. The bug has been fixed. Unfortunately, it existed in the system for about three months, as Okta's report said the software had been affected since July until someone noticed on Oct. 30. That's a very long time for such a vulnerability to be present, but it's unclear at this point if anyone was negatively affected by it.

Topics Cybersecurity

Comments

Leave a Comment