-
Sensitive information disclosure, the following two attacks scenarios are provided
I feel like the following one is really prompt injection.
> User A targets a well crafted set of prompts to b…
-
### Answers checklist.
- [X] I have read the documentation [ESP-IDF Programming Guide](https://docs.espressif.com/projects/esp-idf/en/latest/) and the issue is not addressed there.
- [X] I have up…
-
Hello,.
A lot of hosters experiencing DDoS attacks on their servers and it occurs very often at the last time. In most cases a datacenter simply null-routed a server IP that was DDoSed for 24 hours, b…
-
Hi, I tried to reproduce the code for label consistent attack in your paper, but I can only get a very low ASR (lower than 10%). Could you provide an example command for the generation of backdoor dat…
-
### Describe the bug
Please watch the below trace found while trying to run the scan using zap docker
```bash
└─$ sudo docker run -p 8080:8080 -v $(pwd):/zap/wrk/:rw -t owasp/zap2docker-stable…
-
Apache 2.4.x < 2.4.56 Multiple Vulnerabilities
Description
The version of Apache httpd installed on the remote host is prior to 2.4.56. It is, therefore, affected by multiple vulnerabilities as refe…
-
(is this even the right repo?)
https://github.com/megascatterbomb/MegaAntiCheat/issues/8
-
### Type
Suggestions for Improvement
### What would you like to report?
The term adversarial attack usually has a broader definition than the intention of ML01. For example it usually includes data…
-
This is a bit of a gnarly request, but I can justify it, sorta.
If you're already running SSL for your websockets, the whole masking part of the protocol is a lot less relevant I think.
Would it…
-
**IMPORTANT: Check the wiki**
Before submitting new issue, please check the [Wiki](https://github.com/jgromes/RadioLib/wiki) and the [API documentation](https://jgromes.github.io/RadioLib/). You migh…