Aggregator
CVE-2025-68429 | storybookjs storybook up to 7.6.20/8.6.14/9.1.16/10.1.9 Environment Variable information disclosure (EUVD-2025-204013)
CVE-2025-14836 | ZZCMS 2025 User Data Storage /reg/user_save.php cleartext storage in a file or on disk (EUVD-2025-204007)
CVE-2025-14837 | ZZCMS 2025 Backend Website Settings /admin/siteconfig.php stripfxg icp code injection (EUVD-2025-204005)
红队资产指纹识别神器——Muki 2.02
LLM10: Unbounded Consumption – FireTail Blog
Dec 17, 2025 - Lina Romero - The OWASP Top 10 for LLMs was released this year to help security teams understand and mitigate the rising risks to LLMs. In previous blogs, we’ve explored risks 1-9, and today we’ll finally be deep diving LLM10: Unbounded Consumption. Unbounded Consumption occurs when LLMs allow users to conduct excessive prompt submissions, or submission of overly complex, large or verbose prompts, leading to resource depletion, potential Denial of Service (DoS) attacks, and more. An inference is the process that an AI model uses to generate an output based on its training. When a user feeds an LLM a prompt, the LLM generates inferences in response. Follow-up questions trigger more inferences, because each additional interaction builds upon all the inferences, and potentially also previously submitted prompts, required for the previous interactions. Rate limiting controls the amount of requests an LLM can receive. When an LLM does not have the adequate rate limiting, it can effectively become overwhelmed with inferences and either begin to malfunction, or reach a cap on utilization and stop responding. A part of the LLM application could become unavailable. In AI security, we often refer to the “CIA,” which stands for Confidentiality, Integrity and Availability. Unbounded Consumption can cause an LLM to fail at the “Availability” part of this equation, which in turn can affect the LLM’s Confidentiality and Integrity. Another way in which Unbounded Consumption can negatively impact an LLM is through Denial of Wallet (DOW). Effectively, attackers will hit the LLM with request upon request, which can run up the bill if rate limiting is not in place. Eventually, these attacks can cause the LLM to reject requests due to the high volume of abnormal activity, which will stop it from working entirely.
Mitigation Methods
Some ways to reduce the risk of Unbounded Consumption include: Input Validation- ensure that inputs do not exceed reasonable size limits
Rate Limiting- apply user quotas and limits to restrict requests per user
Limit Exposure of Logits and Logprobs- obfuscate the exposure of API responses, provide only necessary information to users
Resource Allocation Management- monitor resource utilization to prevent any single user from exceeding a reasonable limit
Timeouts and Throttling- set time limits and throttle processing for resource intense operations to prevent prolonged resource consumption
Sandbox Techniques- restrict the LLMs access to network resources to limit what information it can expose
Monitoring and Logging- get alerts and continually monitor usage for unusual patterns Unbounded Consumption poses a critical risk to LLMs as it can cause DoS or DoW, however, with proper security measures and training, teams can minimize the risk of Unbounded Consumption in their AI applications. For more information on the rest of the OWASP Top 10 for LLMs, head over to the LLM series on our blog page. And for general information on how to take charge of your own AI security posture, schedule a demo today!
The post LLM10: Unbounded Consumption – FireTail Blog appeared first on Security Boulevard.
LLM10: Unbounded Consumption – FireTail Blog
有消息称因内存供应失衡 英伟达将从2026年年初开始削减RTX50消费级显卡产能
CVE-2025-40780
测试swagger未授权的一个神器
CVE-2025-43335 | Apple macOS up to 14.8.1/15.7.1 App information disclosure (WID-SEC-2025-2475)
CVE-2025-43348 | Apple macOS up to 14.8.1/15.7.1 App access control (WID-SEC-2025-2475)
派早报:小米发布 MiMo-V2-Flash 模型、FIFA 将推出新游戏等
连续四次!微步荣获CNNVD“年度优秀技术支撑单位”!
Smashing Security podcast #448: The Kindle that got pwned
JVN: Ruijie Networks製AP180シリーズにおけるOSコマンドインジェクションの脆弱性
Homomorphic Encryption for Privacy-Preserving MCP Analytics in a Post-Quantum World
Explore homomorphic encryption for privacy-preserving analytics in Model Context Protocol (MCP) deployments, addressing post-quantum security challenges. Learn how to secure your AI infrastructure with Gopher Security.
The post Homomorphic Encryption for Privacy-Preserving MCP Analytics in a Post-Quantum World appeared first on Security Boulevard.