-
**Problem**:
I couldn't find if this has been considered or not :
Votes can be subject to data poisoning attacks if an ill-intent group decides to run a coordinated spam campaign on a conversation, …
-
Decription:
In LOL world, there is a hero called Teemo and his attacking can make his enemy Ashe be in poisoned condition. Now, given the Teemo's attacking ascending time series towards Ashe and the …
-
(3) p 3, sec 3.2. Recommendations for UDP requestors
R7. UDP requestors MAY drop fragmented DNS/UDP responses without IP
reassembly to avoid cache poisoning attacks.
As written, I don't…
vixie updated
7 months ago
-
### Context
- **XO origin**: the sources / XO Appliance
- **Versions**:
- Node: **?**
- xo-web: **xo-web 5.32.1**
- xo-server: **xo-server 5.32.2**
### Expected behavior
When…
LPJon updated
3 years ago
-
Vulnerable Library - gunicorn-21.2.0-py3-none-any.whl
WSGI HTTP Server for UNIX
Library home page: https://files.pythonhosted.org/packages/0e/2a/c3a878eccb100ccddf45c50b6b8db8cf3301a6adede6e31d48e85…
-
After selecting Poisoning Attacks and then Create Victim Host List, the network range isn't registering.
Enter your target network range (nmap format): 192.168.1.1/24
Enter your target network range…
-
Food and health system:
#42
- [x] Being able to die and respawn
Food exhaustion:
- [ ] Swimming
- [ ] Sprinting
- [ ] Jumping
- [ ] Jumping while sprinting
- [ ] Attacking
- [x] Hunger/f…
-
@samyk how do you feel about breaking out the exploits into independent modules (e.g. network hijacking, cookie siphoning, remote web backdoors, remote router backdoor) that can distributed through NP…
-
#### Selling Point (Option-1)
Creating this issue so that discussion on definitions does not get lost. Here is how I am defining forensic anti-patterns:
```
Forensic anti-patterns for machine …
-
### Feature description
Features:
Radiation
This system would make it so that when something enters a certain distance it would irradiate it until it leaves the zone. The closer the object is to …