-
# The square root with precomp optimisation is not currently in constant-time
PR #354 adds the precomp optimisation to the square-root for Banderwagon/Bandersnatch.
The implementation needs to be …
-
Hi. We are also trying to move our cognito authentication from ui layer to server side. We also want to have the cognito security features like throttling and temp lockouts to avoid brute force attack…
-
@terriko raised [this concern on public-webappsec](https://lists.w3.org/Archives/Public/public-webappsec/2020May/0003.html):
> I do wonder if we should (non-normatively) mention the concern that ha…
hober updated
4 years ago
-
Firstly, the app is really cool. Hats off!!
In order to prevent XSS attacks and other security issues, should the iframe in ember-twiddle point to a different domain? Similar to JSFiddle. Currently, …
-
### Vulnerability report
**Description**
Attackers can pass malicious URLs as parameters to the pingback.ping method by constructing malicious requests. The first parameter in this method allows pa…
-
Vulnerable Library - tornado-6.2-cp37-abi3-manylinux_2_5_x86_64.manylinux1_x86_64.manylinux_2_17_x86_64.manylinux2014_x86_64.whl
Tornado is a Python web framework and asynchronous networking library…
-
Hi,
it would be cool if I could redirect /wp-admin -> /login (being "login" my chosen string, of course).
This request an external editing i.e htaccess or another redirection plugin, or could be don…
-
# Epic: Immutability foundations
## Scope
As Garden Linux user, I want an immutable system, where the entire boot chain is fully authenticated cryptographically while still providing a working envir…
-
Thanks for making this 💪
I think the site would benefit from having security improved. Unfortunately, people have a tendency to re-use passwords, and as of now, the password and the session cookie …
-
I'm running Pisth version 11.3.1. Unless I missed it, I noticed that when connecting to a new host via SSH for the first time, there is no host key verification prompt for adding host trust to your c…