-
Hi @mrasirkhan ,
Thanks for sharing the repository and it's a nice one.
I noticed one issue - the following program hashes then stores passwords without a salt:
- automation-ui/src/main/java/c…
-
**Describe the project you are working on:**
2D Fighting Game.
**Describe the problem or limitation you are having in your project:**
I'm writing my project using entirely static typing. Unfortun…
-
### Environment
* Python version: 3.7
* Nautobot version: 1.1.3
### Proposed Functionality
Nautobot tokens are restricted to 40 characters. Making this a precise requirement reduces the s…
-
```
It is very useful to have a login program which can read
for example /etc/passwd, and prompts for a username. It should
launch a shell when a valid username has been entered as that user.
We coul…
-
```
It is very useful to have a login program which can read
for example /etc/passwd, and prompts for a username. It should
launch a shell when a valid username has been entered as that user.
We coul…
-
### Issue to be solved
A frequent use-case in blockchains is to have a user sign some data structure, similarly to how we asks users to sign transactions. Depending on the application, the data struc…
dete updated
5 months ago
-
### Finding Description
The application has globally disabled App Transport Security (ATS).
ATS helps ensure secure connections between an app and the back end server(s) and is a client side protect…
-
Unless I misunderstand the protocol this system is open to enumeration and interception attacks:
An attacker monitors the DHT and cracks topics as he learns of them by taking the applicable timesta…
-
```
i have used man in the middle attack before, which i set up a fake essid and
bssid, then user connects to the system i redirect them to a fake page showing
them to type in the wpsk password, it …
-
```
i have used man in the middle attack before, which i set up a fake essid and
bssid, then user connects to the system i redirect them to a fake page showing
them to type in the wpsk password, it …