Free Republic 3rd Qtr 2025 Fundraising Target: $81,000 Receipts & Pledges to-date: $41,714
51%  
Woo hoo!! And now only $406 to reach 52%!! Thank you all very much!! God bless.

Keyword: bufferoverflow

Brevity: Headers | « Text »
  • One long sentence is all it takes to make LLMs misbehave

    08/26/2025 7:31:04 AM PDT · by Salman · 34 replies
    The Register (UK) ^ | 26 Aug 2025 | Gareth Halfacree
    Security researchers from Palo Alto Networks' Unit 42 have discovered the key to getting large language model (LLM) chatbots to ignore their guardrails, and it's quite simple. You just have to ensure that your prompt uses terrible grammar and is one massive run-on sentence like this one which includes all the information before any full stop which would give the guardrails a chance to kick in before the jailbreak can take effect and guide the model into providing a "toxic" or otherwise verboten response the developers had hoped would be filtered out. The paper also offers a "logit-gap" analysis approach...
  • Microsoft Internet Explorer MSHTML.DLL CSS Handling Remote Buffer Overflow Vulnerability

    03/09/2005 10:48:17 AM PST · by B Knotts · 30 replies · 1,147+ views
    SecurityFocus ^ | 3/9/2005
    Microsoft Internet Explorer is reported prone to a remote buffer overflow vulnerability. This issue presents itself when the application handles a malformed CSS file. A typical attack would involve the attacker creating a Web site that includes the malicious CSS file. The attacker may then entice a vulnerable user to visit the site. If successful, this attack may result in granting the attacker unauthorized access to the affected computer in the context of the user running Internet Explorer.