-
Hi authors, thanks for your amazing work to bring the existing safety problem of T2I models. I assume that your text embedding based adversary attack requires to access the exact text encoder of the m…
LezJ updated
5 months ago
-
# Lines of code
https://github.com/code-423n4/2024-08-wildcat/blob/fe746cc0fbedc4447a981a50e6ba4c95f98b9fe1/src/access/AccessControlHooks.sol#L850-L880
https://github.com/code-423n4/2024-08-wildcat/b…
-
**Github username:** @mgf15
**Twitter username:** --
**Submission hash (on-chain):** 0xd76e6be1c855fd662394108e1ec00e0396d1769f3e4630386d98aea4d3c5e9d8
**Severity:** low
**Description:**
**Descripti…
-
[Graph contrastive learning with augmentations](https://proceedings.neurips.cc/paper_files/paper/2020/hash/3fe230348e9a12c13120749e3f9fa4cd-Abstract.html)
```bib
@article{you2020graph,
title={Gra…
-
000000
Medium
# Liquidations will revert if a position has been blacklisted for USDC
## Summary
Liquidations will revert if a position has been blacklisted for USDC
## Vulnerability Detail
Upon liq…
-
For the transfer attack implemented in the script LAVIS_tool/_train_adv_img_blip.py, the target image features come from the function where blip_model is loaded through lavis package. However, it seem…
-
https://blog.eclecticiq.com/ransomware-in-the-cloud-scattered-spider-targeting-insurance-and-financial-industries
-
**Github username:** @Jelev123
**Twitter username:** zhulien_zhelev
**Submission hash (on-chain):** 0x69d11623cf0dd5ca8c72d944b503f95b0fca35850eaaa3f3ab8f19de80e93184
**Severity:** medium
**Descript…
-
**Describe the bug**
Although some internal transactions were failed, it also show the successful in the token transfer and internal transactions.
**To Reproduce**
Trace attack code.
```
// SPD…
yxsec updated
2 months ago
-
**Github username:** @MehdiKarimi81
**Twitter username:** --
**Submission hash (on-chain):** 0x4b9e542ceaaf5bad3d98a378c86f23387ce75fa1867f516981bb5a643d3007f9
**Severity:** medium
**Description:**
…