-
**Github username:** @emerald7017
**Twitter username:** --
**Submission hash (on-chain):** 0x14109454c70b8e56b431e31f713f1e10c079525d7cbd269b409665a33d70a909
**Severity:** medium
**Description:**
##…
-
**Github username:** @0xbrett8571
**Twitter username:** 0xbrett8571
**Submission hash (on-chain):** 0x650ee27c834bfa0402ab1a4414f4d2d824f4de1565730242f9b6efa05db14694
**Severity:** medium
**Descript…
-
`compiler.Compile(behaviorScript, token); ` and `var simulationAction = botAgent.ComputeNextMove(state);` should not indefinitely allocate memory.
Allocating too much memory could cause the simulatio…
-
**Github username:** --
**Twitter username:** --
**Submission hash (on-chain):** 0x36c6a15aba3a17b49c2da79df4af1f3759d1ee0707ab566458118bc4f6767b8b
**Severity:** medium
**Description:**
**Descriptio…
-
Nice idea to collect some techniques on model loading vulnerabilities.
In the README it currently states that TensorFlow is uncertain and might be using pickle in a safe way.
But it turns out th…
-
The timing attack algorithm should be able to discover a valid, hard-coded, API key with zero knowledge.
Some ideas:
- [ ] Brute force the last N chars
- [ ] In systems with many valid API keys it mi…
-
Hi,
is that possible to exploit this IOCTL **ArbitraryReadWriteHelperNonPagedPoolNx** with somehow technique? i'm actually trying to exploit it but there so many filters that i can't. I guess it onl…
-
Hi!
The section about SUID with only mentoins this option:
> ./vim -c ':py import os; os.execl("/bin/sh", "sh", "-pc", "reset; exec sh -p")'
This can be added:
>./vim -c ':set shell=/bin/s…
-
Exploit coarray to make hash table a massively parallel container is a challenging aim, probably I'll be not up to the task. To start I have to deeply study the work of @MichaelSiehl
- https://github…
-
https://play.picoctf.org/practice/challenge/440