- Sort Score
- Result 10 results
- Languages All
Results 1 - 5 of 5 for vulnerabilities (0.04 sec)
-
SECURITY.md
implementation bugs that might allow attackers to leave malicious code running and leak or tamper with applications from other users. Please report vulnerabilities to the vendor of the affected hardware accelerator. ## Reporting vulnerabilities ### Vulnerabilities in TensorFlow This document covers different use cases for TensorFlow together with comments
Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0) -
.github/ISSUE_TEMPLATE/config.yml
blank_issues_enabled: false contact_links: - name: Security Contact about: Please report security vulnerabilities to ******@****.*** - name: Question or Problem about: Ask a question or ask about a problem in GitHub Discussions. url: https://github.com/fastapi/fastapi/discussions/categories/questions - name: Feature RequestRegistered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Jul 29 23:35:07 UTC 2024 - 926 bytes - Viewed (0) -
.github/workflows/codeql-analysis.yml
# Supported options are ['csharp', 'cpp', 'go', 'java', 'javascript', 'python'] language: ['java'] # Learn more... # https://docs.github.com/en/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#overriding-automatic-language-detection steps: - name: Checkout repository uses: actions/checkout@v2 with:
Registered: Thu Sep 04 15:34:10 UTC 2025 - Last Modified: Fri Oct 02 13:24:14 UTC 2020 - 2.5K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/ds/DataStoreFactory.java
* in the data store plugin directory and extracts component class names. * * <p>The method uses secure XML parsing features to prevent XXE attacks and * other XML-based vulnerabilities. Component class names are extracted from * the 'class' attribute of 'component' elements in the XML files.</p> * * @return sorted list of data store class simple names discovered from plugins */Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 8.4K bytes - Viewed (0) -
.github/workflows/codeql-analysis.yml
# Supported options are ['csharp', 'cpp', 'go', 'java', 'javascript', 'python'] language: ['java', 'javascript'] # Learn more... # https://docs.github.com/en/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#overriding-automatic-language-detection steps: - name: Checkout repository uses: actions/checkout@v5
Registered: Wed Sep 10 11:36:15 UTC 2025 - Last Modified: Thu Aug 21 23:08:02 UTC 2025 - 4K bytes - Viewed (0)