rcarback on Nostr: "Then, we show how this vulnerability can be used to construct second preimages and ...
"Then, we show how this vulnerability can be used to construct second preimages and preimages for the implementation, and we provide a specially constructed file that, when hashed, allows the attacker to execute arbitrary code on the victim's device. " 💥🔥
https://eprint.iacr.org/2023/331
https://eprint.iacr.org/2023/331