-
**FINDING ID:** iSEC-COMMO13-5
**TARGETS:** The lack of a Secure flag on the sysauth administrative session cookie.
**DESCRIPTION:** The Secure flag, when set by the web application for modern brows…
-
# Implementing Embedded Uniqueness for Naturally One-to-One Monoids in a High Speed Learning Neural Network for Cyber Defense Software Engineering Review
With the latest generation of c…
-
# Primer
Dangerzone currently uses two containers (Docker containers on MacOS/Windows, Podman containers on Linux) for the conversion process:
- The first container accepts a suspicious document…
-
to submit a compendium issue add a comment to this thread with
- the compendium that the unit appears in
- the issue that you observed, ie, expected value or items and what the actual state …
-
at the moment, auto generated walls could block off access to locations that need adjacent access. We currently solve this by placing an extra road, but instead we could just check for proximity and p…
-
Is it possible to inject `alert('xss')` via translation string or is there sanitization to prevent this? It's not a new issues but I suspect all translations may be vulnerable to attacks like this. Of…
-
We reproduce the experiments for Cifar-10 according to run_backdoor_cv_task.sh. However, we cannot get the same results as in the paper. The backdoor accuracy is shown in the following figure,
wher…
-
Currently the damage of crits is decreased instead.
-
Feedback from Ilari Liusvaara on the list:
> - I think LabeledWindow should add 64 spaces in front, so it
> reuses the TLS 1.3 signature format.
>
> This reduces risks of cross-protocol attack…
-
I tried to reimplement the results in pytorch a bit like what's done in this: https://github.com/GeorgeTzannetos/ml-leaks-pytorch repo. However both of our implementations get a maximum of 55% precisi…