-
# Summary
A Cross-Site Request Forgery (CSRF) vulnerability has been identified in SeaCms V13.0. This vulnerability allows an attacker to change a user's password without their consent by tricking th…
-
Issue tracker is **ONLY** used for reporting bugs.
## Expected Behavior
Don't show vulnerabilities in dependencies
## Current Behavior
`npm i`
```
3 moderate severity vulnerabilities…
-
### Tooling Suggestion Checklist
- [X] I have tried restarting my IDE and the issue persists.
- [X] I have pulled the latest `master` branch of the repository.
- [X] I have read and agree to Mocha's …
-
I was tried with Pre-trained models,
> SigNet
> SigNet-F lambda 0.95
with **Cosine similarity** between two image features (like: one genuine, one forgery signature).
```
feature1 = base…
-
We found some issues testing blogpost and comments features:
**Anonymous users:**
1. Commenting a blogpost does not evict the cache of blogpost so that the comment is invisible until the cache expir…
-
As reported by Adam from andyet.net over email:
> Installing modules using Cross-Site Request Forgery (CSRF)
>
> It's possible to install and run arbitrary modules using CSRF.
>
> Even though the p…
spolu updated
10 years ago
-
## Expected Behavior
```gherkin
Given I am running a Rails 4.2 application with RailsReadOnlyInjector and Pundit installed
And I write to 'config/initializers/rails_readonly_injector.rb' with:
"""…
-
Hi,
Is there an example of using `summernote-rails` with Active Storage? In the example app, it looks like you set up Active Storage (did migration, included activestorage in application.js), but e…
-
Is it possible to release your pretrained model? It will be grateful.
-
**Describe the bug**
Setup:
- realm EXAMPLE.COM
- good host good.example.com with service principal `HTTP/good.example.com@EXAMPLE.COM`
- evil host (or, realistically, once good but now compromise…