-
https://play.picoctf.org/practice/challenge/435
-
https://play.picoctf.org/practice/challenge/449
-
Collect and store EPSS (exploitability predictability score) in VulnerableCode
-
### What happened?
Assembly.Load and MemoryStream function can be manipulated in client sided c# to load bytes onto the clients pc
### Expected result
nothing
### Reproduction steps
This is a sma…
-
**Github username:** --
**Twitter username:** --
**Submission hash (on-chain):** 0x2298a7229249126b148bc078af30dd6aa987e7b617224c045c4068f1e437844d
**Severity:** high
**Description:**
**Description*…
-
With root access to the compute instance, I was able to do a memory dump and found the PGP private key in plain text.
-
# Proposal to Prevent GPU Spoofing and Exploitation of Block Rewards
## Introduction
To maintain the integrity and fairness of block rewards, it is crucial to implement measures that prevent b…
-
Hey I found this explicable exploit of sorts to produce infinite fluids (I found it with bone broth and pre-gelatin specifically).
Steps to Reproduce:
1. Gather a Saucepan and a Cauldron
2. Fill…
-
If you get hit by a UDP flood attack plasmovoice will freak out and start spamming 40GB worth of errors before finally crashing the server.
https://gist.github.com/Frerduro/9495029169311aec1c6108e152…
-
Players can exploit a loophole that allows them to endlessly sell animals by having two players kill animals and place them on each other's horses. They can then repeatedly sell these at a butcher. Im…