-
### Expected Behavior
When the user supplied value can not be converted to the desired type (e.g. UUID) an exception should be thrown.
### Actual Behaviour
If the input invalid, the value is …
-
There needs to be done a deep review of cryptography usage. Even though you're saying you're using scure/bip39 for mnemonics, it is not the case for every other feature.
1. why is crypto-browserify…
-
This project leverages computer vision and deep learning to detect suspicious activities within retail stores.
Input:
The input consists of real-time video feeds from surveillance cameras placed w…
-
## Vulnerabilities found for admission-webhook:v1.9.0
```
For OSS Maintainers: VEX Notice
--------------------------------
If you're an OSS maintainer and Trivy has detected vulnerabilities in your …
-
## Vulnerabilities found for tensorboard-controller:1.9.0
```
For OSS Maintainers: VEX Notice
--------------------------------
If you're an OSS maintainer and Trivy has detected vulnerabilities in y…
-
**Is your feature request related to a problem? Please describe**.
Improve zero day exploit protections for containers running untrusted code
**Describe the solution you'd like**.
Ability t…
-
### Library name and version
Azure.Extensions.AspNetCore.DataProtection.Blobs 1.3.4
### Describe the bug
Azure.Extensions.AspNetCore.DataProtection.Blobs depends on ... depends on System.Drawing.C…
-
**Bounty description**
Implement and optimize the use of the `mocha --parallel` flag to improve test execution times in the Extractor repository. Initial impressions suggest a 30-40% improvement in…
-
Information security is an important topic that includes the skills needed to secure sensitive data from cyber threats. The EC-Council 712-50 test commonly known as the Certified CISO test focuses on …
-
## CVE-2018-3750 - High Severity Vulnerability
Vulnerable Libraries - deep-extend-0.4.2.tgz, deep-extend-0.5.0.tgz, deep-extend-0.4.1.tgz
deep-extend-0.4.2.tgz
Recursive object extending
Library h…