-
### How to use GitHub
* Please use the đź‘Ť [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to show that you are interested into the same feature.
* Pl…
-
Hi! Thanks for this great repo.
I have some questions about the implementation of PGDAttack.
1) The learning rate of PGDAttack. https://github.com/EdisonLeeeee/GreatX/blob/49675e30ed38b2518f7a1b85b6…
-
**[Original submission](https://gna.org/bugs/index.php?21619)** by elvish_pillager on 2014-02-08
Zero/nonzero defense_weight to determine whether an attack can be used on defense is fine, although no…
-
## CVE-2017-7561 - High Severity Vulnerability
Vulnerable Library - resteasy-jaxrs-3.1.4.Final.jar
Resteasy
Library home page: http://www.jboss.org
Path to dependency file: /server/plugins/noderoste…
-
Adobe Flash Player 23 / 0.8p
-Using body lotion on scales use text for fur
-No single small weapon exp
-Can't enable Poisoning with v.glands only(env.bolt probably too)
-Poisoning and Enve…
-
Hi, thanks very much for sharing the wonderful work and its codes. It is no doubt that this work provides insights of the backdoor-attack area. Recently, we are preparing new works for CVPR2022. In th…
-
Let's have an attacker with modified wallet trying to purchase goods from a merchant using Kasisto. The attacker's wallet is modified in a such way, that while apparently sending the transaction, it d…
-
Hey,
I wasn't able to report this security vulnerability via the only given channel on BugCrowd. The BugCrowd triage team [said](https://bugcrowd.com/submissions/3f86e5a6-b68a-403d-aed8-3cab3904139…
-
Allow the user to specify multiple acceptance policies. If a certificate satisfies quorum under _any_ policy, flag it as accepted.
This could help achieve a better mix of availability and security - …
-
```
What steps will reproduce the problem?
1. Set MITM VECTOR => Wirless AP Generator (setting: Active, "fakeAP", channel
1, network Wlan0 (for access to real gateway), attack wlan1 (Alfa card for
f…