-
hi,
there is a remote attack that can be carried out in perpetuity against vulnerable nodes in a way that a single attacking machine can force `dogecoind` to upload > 130MB/s to the attacking machi…
-
# Architecture
This document outlines the architecture of the AI Nutrition-Pro application.
## Containers Context diagram
```mermaid
C4Container
title Container diagram for AI Nutrition…
-
Hello,
From what I understand, anyone could create a Haveno network. It is good for decentralization but it brings the issue of fragmentation. Specially for an order book, the more offers there are…
-
# Architecture
This document outlines the architecture of the AI Nutrition-Pro application, including system context, containers, and deployment views. The architecture is depicted using C4 diagram…
-
# Bug report
_This issue was initially reported to Python Security Team, and they decided to make the
issue public._
`socket.create_connection(address, timeout[, ...])` function can be abused t…
-
# 每日安全资讯(2024-02-17)
- HackerOne Hacker Activity
- [Multiple Open Redirect on TikTok domains](https://hackerone.com/reports/2221547)
- [HackerOne SAML signup domain enforcement bypass results in …
-
# Enhancement
With the mitigations for [CVE-2020-10735](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10735) in place, there's tension between:
* security-minded folks which need to prot…
-
As I mentioned in #156, I don't think people will want a whole DDOS detection or a throttler built-in, but it would be nice to have hooks helping an external system that does it.
There are two fronts…
therc updated
3 months ago
-
### The original blog info
| subject | content |
:- | :---------------------
title | Protecting APIs from abuse using sequence learning and variable order Markov chains
url | [blog url](https://blog.c…
-
The help text for the `custom_domain` setting contains a mention of a CNAME record, but we should still make sure to also explain custom domains in more detail in the user documentation, and link to t…