Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
ExacqVision Web Service Vulnerability: How to Prevent a CSRF Disaster
Stay alert! Johnson Controls’ exacqVision Web Service, versions 24.03 and prior, are vulnerable to Cross-Site Request Forgery (CSRF). Exploitable remotely, this flaw could let attackers perform admin-level operations. Update to version 24.06 to mitigate the risk.

Hot Take:
Looks like Johnson Controls’ exacqVision Web Service got caught in a cross-site request forgery act. Who knew that even surveillance systems needed better security surveillance?
Key Points:
- CVSS v3 score: 6.8 — not great, not terrible.
- Exploitable remotely — hackers don’t even need to leave their couch.
- Vendor: Johnson Controls, Inc. — oops, they did it again.
- Vulnerability: Cross-Site Request Forgery (CSRF) — sounds fancy, isn’t it?
- Mitigation: Update to version 24.06 — patch it up, people!