When making authenticated API requests to AWS, the requests must be signed
with your AWS access key. The initial signing algorithm, SigV1, was vulnerable
to collisions. A person-in-the-middle attac...
Thu, Dec 18th, 2008
Full administrative access to the Azure Red Hat Enterprise Linux Appliance REST API was publicly exposed.
It allowed malicious actors uploading packages that would be acquired by client virtual mac...
Sat, Nov 26th, 2016
Patrick Hudak demonstrated possible subdomain takeover using the Traffic Manager in Azure.
Mon, Oct 8th, 2018