-
## CVE-2019-12380 - Medium Severity Vulnerability
Vulnerable Libraries - linux-yoctov5.4.51, linux-yoctov5.4.51
Vulnerability Details
**DISPUTED** An issue was discovered in the efi subs…
-
I read the [Procedures section](https://www.w3.org/about/positive-work-environment/#Procedures), expecting it to tell me the steps one should take, if there is a Code violation. But it only says: "es…
-
I was able to produce a sufficiently small transaction with a moderator whose fee was larger than the initial transaction amount. When the already opened dispute was being resolved by the moderator, t…
-
Trade ID: 3forcob-8ee50b92-815d-4c5c-a75a-42ad8c1578b1-162
Time-locked transaction that sent funds to the bisq donation address:
a3407c4b3574710a3f8ea1d9d4c1c9671881983edc33927028a90cbc5efbad4…
-
In our developer chat, we discussed that one of the best ways forward was to build an open source plugin that allows different platforms to use Ulex. Instead of creating a full Ulex platform, we can c…
-
Once you get your good faith estimate from your provider or facility, keep it in a safe place so you can compare it to bills you get later.
If you get the bill and the charges are at least $400 above…
-
### Is there an existing issue for this?
- [X] I have searched the existing issues
### Feature Description
I want to add a Terms and Conditions page to our diabetes prediction website to clearly ou…
-
# Funds can be stuck in contract if deployed
### Severity
High Risk
### Relevant GitHub Links
https://github.com/Cyfrin/2023-07-escrow/blob/65a60eb0773803fa0be4ba72defaec7d8567bccc/src/Escrow.sol#L3…
-
[Otter](https://otterkids.com/), a project that emerged from our [ODR Hackathon](http://www.techforjustice.org/san-francisco/),is a tool that enables students to resolve conflicts with peers and adult…
-
/spec a method to prove you did a bug bounty without revealing the solution using zero-knowledge proofs so that white hat hackers can get paid properly and incentivize cybersecurity in any industry