borgbackup/borg - Deduplicating archiver with compression and authenticated encryption. (⭐️11860) chubin/cheat.sh - the only cheat sheet you need [MIT License] (⭐️39433) chubin/wttr.in - ⛅ The ri
mediastream: Fix authenticated format extraction (#8657) by NickCis nebula: Overhaul extractors ([#8566](https://github.com/yt-dlp/yt-dlp/issue...yt-dlp 2023.11.16 Changelog Extractor changes abc.net.au: iview, showseries: Fix extraction (#8586) by bashonly ...
21 dont.build A simple, opinionated decision system to help decide whether to build a software feature or not. knadh 221 22 tilde Minimal browser startpage. xvvvyz 835 23 ikea-stock-notifier A notifier that lets users subscribe to their favorite IKEA products which are unavailable. This notifi...
The presence of the unbroken key or the lock icon on the web browser once meant that the connection between the user and the remote web server was authenticated, secured, encrypted . . . and not susceptible to any form of eavesdropping by any third party. Unfortunately, that is no longer ...
authenticated-resolving-unauthorized-payment.com^ ||apple-id.secure.lockedaccount-verifydetails.com^ ||apple-idvalidation.com^ ||apple-idyun.top^ ||apple-login-detection.com^ ||apple-mac-security7080-alert.info^ ||apple-mac911.onlinesoftwaresollutionhelpdesk.info^ ||apple-privacy-account.ngrok....
Every redirected website will be given one token. This idea is OK. However, all URLs related to the redirected website use the same token. This means if the authenticated site itself has Open Redirect vulnerabilities. Then victims can be redirected to any site from Amazon....
So... DO NOT create a GitHub issue for it ;) Reporting a vulnerability Privately and confidently, send me a detailed description of the vulnerability you have discovered using an encrypted and authenticated channel. Personally, I prefer this to be done using PGP encrypted email. Contact informati...
User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-148180766 mooneee/CVE-2020-0121 CVE-2020-0551 Load value injection in some Intel(R) Processors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure...