New research from the University of Waterloo shows that artificial intelligence (AI) still struggles with some basic software ...
Because attacker-supplied flow data is used in public flows, the bug leads to unauthenticated remote code execution.