-
I think you can calculate the exact size of a file based on the encrypted version. This could leak information in some situations. Could be solved by rounding up to a 1MB boundary.
-
**Version**
dev
**Describe the bug**
Memory usage of tab explodes at some point
**To Reproduce**
Steps to reproduce the behavior:
1. Go to 'Settings'
2. Click on 'IRC'
3. Select an active …
-
```
What steps will reproduce the problem?
1. keyPress = [[KeyDownInfo alloc] init];
2.
3.
What is the expected output? What do you see instead?
leaking should release somewhere
What version of the …
-
```
What steps will reproduce the problem?
1. keyPress = [[KeyDownInfo alloc] init];
2.
3.
What is the expected output? What do you see instead?
leaking should release somewhere
What version of the …
-
```
What steps will reproduce the problem?
1. keyPress = [[KeyDownInfo alloc] init];
2.
3.
What is the expected output? What do you see instead?
leaking should release somewhere
What version of the …
-
We run Django with `DEBUG = True` when running our tests. This leaves open a door for a test error to leak sensitive and semi-sensitive information. For example, tests can leak info in debug logs and …
-
In the implementation and experiments, data normalization/standardization is done before splitting into train and test set, that could result in test set information leaked into training set...
-
Currently the conversion from projective to affine in pubkey creation, signing, and ECDH use a constant time ladder inverse because the z value conceivably leaks information. This applies even in the …
-
```
What steps will reproduce the problem?
1. open guiclient.dpr
2. click menu project - Eurekalog Options- Activate Eurekalog- Catch memory
Leak-ok
3. run guiclient.exe ,click news, then close guicl…
-
```
What steps will reproduce the problem?
1. open guiclient.dpr
2. click menu project - Eurekalog Options- Activate Eurekalog- Catch memory
Leak-ok
3. run guiclient.exe ,click news, then close guicl…