Tag: security vulnerability
-
Simon Willison’s Weblog: A warning about tiktoken, BPE, and OpenAI models
Source URL: https://simonwillison.net/2024/Nov/21/a-warning-about-tiktoken/#atom-everything Source: Simon Willison’s Weblog Title: A warning about tiktoken, BPE, and OpenAI models Feedly Summary: A warning about tiktoken, BPE, and OpenAI models Tom MacWright warns that OpenAI’s tiktoken Python library has a surprising performance profile: it’s superlinear with the length of input, meaning someone could potentially denial-of-service you by sending you…
-
The Register: Fortinet patches VPN app flaw that could give rogue users, malware a privilege boost
Source URL: https://www.theregister.com/2024/11/14/fortinet_vpn_authentication_bypass_bug/ Source: The Register Title: Fortinet patches VPN app flaw that could give rogue users, malware a privilege boost Feedly Summary: Plus a bonus hard-coded local API key A now-patched, high-severity bug in Fortinet’s FortiClient VPN application potentially allows a low-privilege rogue user or malware on a vulnerable Windows system to gain higher…
-
The Register: HTTP your way into Citrix’s Virtual Apps and Desktops with fresh exploit code
Source URL: https://www.theregister.com/2024/11/12/http_citrix_vuln/ Source: The Register Title: HTTP your way into Citrix’s Virtual Apps and Desktops with fresh exploit code Feedly Summary: ‘Once again, we’ve lost a little more faith in the internet,’ researcher says Researchers are publicizing a proof of concept (PoC) exploit for what they’re calling an unauthenticated remote code execution (RCE) vulnerability…
-
Simon Willison’s Weblog: From Naptime to Big Sleep: Using Large Language Models To Catch Vulnerabilities In Real-World Code
Source URL: https://simonwillison.net/2024/Nov/1/from-naptime-to-big-sleep/#atom-everything Source: Simon Willison’s Weblog Title: From Naptime to Big Sleep: Using Large Language Models To Catch Vulnerabilities In Real-World Code Feedly Summary: From Naptime to Big Sleep: Using Large Language Models To Catch Vulnerabilities In Real-World Code Google’s Project Zero security team used a system based around Gemini 1.5 Pro to find…