-
Good day,
This was brought up by our security team by one of their scans. I told them I would bring this up to you.
**Cookie Session vulnerabilities:**
1) Clear Text (missing value=secu…
-
Hi,
I've come across an issue where a Babylon texture will simply hijack the last loaded/rendered OpenFL texture.
I've modified the openfl sample project to illustrate the issue:
https://github.com/…
Matan updated
8 years ago
-
As a user, I want to use a global search interface to quickly find any relevant entity or relation instance.
Steps:
1. User clicks on the search icon or navigates to the search bar.
2. User enters a …
-
For some reason I often check `.user.js` URLs, but I don't want to install them in `FireMonkey` every time.
I don't want the `FireMonkey` installation prompt to pop up every time, it would be nice …
qupig updated
4 months ago
-
# New methods required for dumping syscall table address
A once common way of exposing the system call table of the Linux kernel was to lookup the call table's address using the [`kallsym_lookup_na…
-
Hi again @Nicholaswogan !
I was wondering if you ever thought about the adaptive timestepping capability that exists in Scipy LSODA ? Is anything like this possible with your implementation ?
Th…
-
### Describe the bug, what's wrong, and what you expected.
My interactive terminal is "hijacked" if I make plots containing latex-formatted labels. Latex-formatted labels are properly rendered only i…
-
```
there's no authentication or encryption, and a UAS could be hijacked using this
link.
Please enhance security.
```
Original issue reported on code.google.com by `andre.kj...@gmail.com` on 19 N…
-
```
What steps will reproduce the problem?
(simple SQL scripts or simple standalone applications are preferred)
1. create two tables "A" and "B" both with a column "C"
2. CREATE INDEX "Foo" ON "A" ("…
-
Now rack-gem v1.5.0 provides IO hijacking API that is function to send HTTP Response by sockets.
If we support this new API, we may need to define Cleint class.