-
### Describe the feature
Currently, we only have support for the base 10 numeral system but it would be cool to support other systems like Hexadecimal numbers for example.
### Use Case
**Low-Level …
-
Prepare a space within the Community repo that will document that we are achieving the regular Best Practices badge and that can be used for auditing purposes.
-
You mention in your README [here](https://github.com/Benjamin-Pasternak/Security_project/blob/17418f395f7452092d1d10b5ace0245545aadbe6/README.md?plain=1#L12-L13) that you are using SHA-256 for passwor…
-
For some use cases it is important to know if the core functions and interfaces are secured using approved cryptography standards. Common lists are the [SOG-IS Agreed Cryptographic Mechanisms](https:/…
-
According to notifications received:
> TLS 1.0 and 1.1 are out-of-date protocols that do not support modern cryptographic algorithms, and they contain security vulnerabilities that may be exploited…
-
I received the following issue:
```python
Some algorithms requires "pip install cryptography". See https://pyjwt.readthedocs.io/en/latest/installation.html#cryptographic-dependencies-optional
Trac…
-
On behalf of Prashanth Thandavamurthy of Arxan Technologies, Inc.
## New Threat
**Threat Category**:
Application: Vulnerable Application
**Threat**:
Inspecting, intercepting and controlling API requ…
-
WDYT? Is this publication in scope?
```
@inbook{Amiel,
author = {Amiel, Frederic and Feix, Benoit and Villegas, Karine},
booktitle = {Selected Areas in Cryptography},
doi = {10.1007/978-3-540-77360…
aewag updated
2 weeks ago
-
Greetings,
I am a security researcher, who is looking for security smells in Puppet scripts. I noticed instances of MD5 uses in one of the Puppet scripts. MD5 is vulnerable to attacks, and should b…
-
### Is your feature request related to a problem?
The YubiKey 4 and 5 series along with the YubiKey NEO support the Personal Identity Verification (PIV) interface specified in NIST SP 800-73 document…