Dust: Privilege Persistence via Cloned Agent

The vulnerability allowed a member to clone an agent managed by the admin by modifying the agent's unique identifier (sid). This resulted in the admin being unable to effectively disable the agen ...

Continue Reading
Dust: BAC – Bypass chatbot restrictions via unauthorized mention injection

The Gemini chatbot was found to have a vulnerability that allowed unauthorized users to bypass permission restrictions and interact with the chatbot. The vulnerability was discovered when a user manua ...

Continue Reading
Dust: Privilege Persistence via Cloned Agent

The vulnerability allowed a member to clone an agent managed by the admin by modifying the agent's unique identifier (sid). This resulted in the admin being unable to effectively disable the agen ...

Continue Reading
curl: Double Free Vulnerability in `libcurl` Cookie Management (`cookie.c`)

Vulnerability description not...Read More ...

Continue Reading
curl: Double Free Vulnerability in `libcurl` Cookie Management (`cookie.c`)

Vulnerability description not...Read More ...

Continue Reading
curl: Use of a Broken or Risky Cryptographic Algorithm (CWE-327) in libcurl

Vulnerability description not...Read More ...

Continue Reading
curl: Use of a Broken or Risky Cryptographic Algorithm (CWE-327) in libcurl

Vulnerability description not...Read More ...

Continue Reading
WakaTime: Broken Access Control Exposes Email Verification Status and Privacy Settings via API Endpoint

The /api/v1/users/{username} endpoint leaked sensitive email-related metadata, such as the user's email confirmation status and privacy settings, without proper authorization checks. This allowed ...

Continue Reading

Back to Main

Subscribe for the latest news: