Tag
#auth
San Francisco, United States / California, 30th January 2025, CyberNewsWire
Whether by intercepting its traffic or just giving it a little nudge, GitHub's AI assistant can be made to do malicious things it isn't supposed to.
DevDojo Voyager through version 1.8.0 is vulnerable to reflected XSS via /admin/compass. By manipulating an authenticated user to click on a link, arbitrary Javascript can be executed.
DevDojo Voyager through 1.8.0 is vulnerable to path traversal at the /admin/compass.
A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the server. A user with a Monitor or Auditor role is supposed to have only read access permissions and should not be able to suspend the server. The vulnerability is caused by the Suspend and Resume handlers not performing authorization checks to validate whether the current user has the required permissions to proceed with the action.
The rate of evolution has been glacial, but tools now understand cloud environments and can target Web applications.
Palo Alto, USA, 30th January 2025, CyberNewsWire
Palo Alto, USA, 30th January 2025, CyberNewsWire
The sudden rise of DeepSeek has raised questions of data origin, data destination, and the security of the new AI model.
The addition of Solvo CSPM to CYE Hyver aims to address the need for multicloud vulnerability monitoring and risk assessment.