Difference between revisions of "explain xkcd:Sandbox"
Line 4: | Line 4: | ||
[http://www.explainxkcd.com/wiki/index.php?title=explain_xkcd:Sandbox&action=edit&oldid=91667 clear sandbox] | [http://www.explainxkcd.com/wiki/index.php?title=explain_xkcd:Sandbox&action=edit&oldid=91667 clear sandbox] | ||
------ | ------ | ||
+ | xkcd [[1957]] WIP: | ||
+ | {| class="wikitable" | ||
+ | ! style="width: 30%;" | Vulnerability | ||
+ | ! style="width: 70%;" | Explanation | ||
+ | |- | ||
+ | |Apple products crash when displaying certain Telugu or Bengali letter combinations. | ||
+ | |[Insert explanation here.] | ||
+ | |- | ||
+ | |An attacker can use a timing attack to extploit[sic] a race condition in garbage collection to extract a limited number of bits from the Wikipedia article on Claude Shannon. | ||
+ | |[Insert explanation here.] | ||
+ | |- | ||
+ | |At the cafe on third street, the post-it note with the wifi password is visible from the sidewalk. | ||
+ | |[Insert explanation here.] | ||
+ | |- | ||
+ | |A remote attacker can inject arbitrary text into public-facing pages via the comments box. | ||
+ | |[Insert explanation here.] | ||
+ | |- | ||
+ | |MySQL server 55.45 secretly runs two parallel databases for people who say "S-Q-L" and "sequel." | ||
+ | |[Insert explanation here.] | ||
+ | |- | ||
+ | |A flaw in some x86 CPUs could allow a root user to de-escalate to normal account privileges. | ||
+ | |[Insert explanation here.] | ||
+ | |- | ||
+ | |Apple products catch fire when displaying emoji with diacritics. | ||
+ | |[Insert explanation here.] | ||
+ | |- | ||
+ | |An oversight in the rules allows a dog to join a basketball team. | ||
+ | |[Insert explanation here.] | ||
+ | |- | ||
+ | |Haskell isn't side-effect-free after all; the effects are all just concentrated in this one. Computer in Missouri that no one's checked on in a while. | ||
+ | |[Insert explanation here.] | ||
+ | |- | ||
+ | |Nobody really knows how hypervisors work. | ||
+ | |[Insert explanation here.] | ||
+ | |- | ||
+ | |CRITICAL: Under Linux 3.14.8 on System/390 in a UTC+14 time zone, a local user could potentially use a buffer overflow to change another user's default system clock from 12-hour to 24-hour. | ||
+ | |[Insert explanation here.] | ||
+ | |- | ||
+ | |x86 has way too many instructions. | ||
+ | |[Insert explanation here.] | ||
+ | |- | ||
+ | |Numpy 1.8.0 can factor primes in O(log n) time and must be quietly deprecated before anyone notices. | ||
+ | |[Insert explanation here.] | ||
+ | |- | ||
+ | |Apple products grant remote access if you send them words that break the "I before E" rule. | ||
+ | |[Insert explanation here.] | ||
+ | |- | ||
+ | |Skylake x86 chips can be pried from their sockets using certain flathead screwdrivers. | ||
+ | |[Insert explanation here.] | ||
+ | |- | ||
+ | |Apparently Linus Torvalds can be bribed pretty easily. | ||
+ | |[Insert explanation here.] | ||
+ | |- | ||
+ | |An attacker can execute malicious code on their own machine and no one can stop them. | ||
+ | |[Insert explanation here.] | ||
+ | |- | ||
+ | |Apple products execute any code printed over a photo of a dog with a saddle and a baby riding it. | ||
+ | |[Insert explanation here.] | ||
+ | |- | ||
+ | |Under rare circumstances, a flaw in some versions of Windows could allow Flash to be installed. | ||
+ | |[[Insert explanation here.] | ||
+ | |- | ||
+ | |Turns out the cloud is just other people's computers. | ||
+ | |[Insert explanation here.] | ||
+ | |- | ||
+ | |A flaw in Mitre's CVE database allows arbitrary code insertion.[~~CLICK HERE FOR CHEAP VIAGRA~~] | ||
+ | |[Insert explanation here.] | ||
+ | |- | ||
+ | |Title text: It turns out Bruce Schneier is just two mischevious kids in a trenchcoat. | ||
+ | |[Insert explanation here.] | ||
+ | |} |
Revision as of 07:26, 19 February 2018
Make changes, try things out, or just have fun with the wiki here! Just leave everything above the line alone, please.
clear sandbox
xkcd 1957 WIP:
Vulnerability | Explanation |
---|---|
Apple products crash when displaying certain Telugu or Bengali letter combinations. | [Insert explanation here.] |
An attacker can use a timing attack to extploit[sic] a race condition in garbage collection to extract a limited number of bits from the Wikipedia article on Claude Shannon. | [Insert explanation here.] |
At the cafe on third street, the post-it note with the wifi password is visible from the sidewalk. | [Insert explanation here.] |
A remote attacker can inject arbitrary text into public-facing pages via the comments box. | [Insert explanation here.] |
MySQL server 55.45 secretly runs two parallel databases for people who say "S-Q-L" and "sequel." | [Insert explanation here.] |
A flaw in some x86 CPUs could allow a root user to de-escalate to normal account privileges. | [Insert explanation here.] |
Apple products catch fire when displaying emoji with diacritics. | [Insert explanation here.] |
An oversight in the rules allows a dog to join a basketball team. | [Insert explanation here.] |
Haskell isn't side-effect-free after all; the effects are all just concentrated in this one. Computer in Missouri that no one's checked on in a while. | [Insert explanation here.] |
Nobody really knows how hypervisors work. | [Insert explanation here.] |
CRITICAL: Under Linux 3.14.8 on System/390 in a UTC+14 time zone, a local user could potentially use a buffer overflow to change another user's default system clock from 12-hour to 24-hour. | [Insert explanation here.] |
x86 has way too many instructions. | [Insert explanation here.] |
Numpy 1.8.0 can factor primes in O(log n) time and must be quietly deprecated before anyone notices. | [Insert explanation here.] |
Apple products grant remote access if you send them words that break the "I before E" rule. | [Insert explanation here.] |
Skylake x86 chips can be pried from their sockets using certain flathead screwdrivers. | [Insert explanation here.] |
Apparently Linus Torvalds can be bribed pretty easily. | [Insert explanation here.] |
An attacker can execute malicious code on their own machine and no one can stop them. | [Insert explanation here.] |
Apple products execute any code printed over a photo of a dog with a saddle and a baby riding it. | [Insert explanation here.] |
Under rare circumstances, a flaw in some versions of Windows could allow Flash to be installed. | [[Insert explanation here.] |
Turns out the cloud is just other people's computers. | [Insert explanation here.] |
A flaw in Mitre's CVE database allows arbitrary code insertion.[~~CLICK HERE FOR CHEAP VIAGRA~~] | [Insert explanation here.] |
Title text: It turns out Bruce Schneier is just two mischevious kids in a trenchcoat. | [Insert explanation here.] |