- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 11 for 2021 (0.19 sec)
-
CHANGELOG/CHANGELOG-1.22.md
- [Important Security Information](#important-security-information-1) - [CVE-2022-3172: Aggregated API server can cause clients to be redirected (SSRF)](#cve-2022-3172-aggregated-api-server-can-cause-clients-to-be-redirected-ssrf) - [CVE-2021-25749: <code>runAsNonRoot</code> logic bypass for Windows containers](#cve-2021-25749-runasnonroot-logic-bypass-for-windows-containers) - [Am I vulnerable?](#am-i-vulnerable)
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Tue Dec 13 12:43:45 GMT 2022 - 454.1K bytes - Viewed (1) -
CHANGELOG/CHANGELOG-1.23.md
- [Important Security Information](#important-security-information-1) - [CVE-2022-3172: Aggregated API server can cause clients to be redirected (SSRF)](#cve-2022-3172-aggregated-api-server-can-cause-clients-to-be-redirected-ssrf) - [CVE-2021-25749: <code>runAsNonRoot</code> logic bypass for Windows containers](#cve-2021-25749-runasnonroot-logic-bypass-for-windows-containers) - [Changes by Kind](#changes-by-kind-6)
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Tue Feb 28 21:06:52 GMT 2023 - 424.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.21.md
- [Node Binaries](#node-binaries-9) - [Changelog since v1.21.4](#changelog-since-v1214) - [Important Security Information](#important-security-information) - [CVE-2021-25741: Symlink Exchange Can Allow Host Filesystem Access](#cve-2021-25741-symlink-exchange-can-allow-host-filesystem-access) - [Changes by Kind](#changes-by-kind-8) - [Feature](#feature-6) - [Bug or Regression](#bug-or-regression-8)
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Fri Oct 14 07:03:14 GMT 2022 - 367.3K bytes - Viewed (4) -
CHANGELOG/CHANGELOG-1.24.md
- [Important Security Information](#important-security-information-3) - [CVE-2022-3172: Aggregated API server can cause clients to be redirected (SSRF)](#cve-2022-3172-aggregated-api-server-can-cause-clients-to-be-redirected-ssrf) - [CVE-2021-25749: <code>runAsNonRoot</code> logic bypass for Windows containers](#cve-2021-25749-runasnonroot-logic-bypass-for-windows-containers) - [Am I vulnerable?](#am-i-vulnerable)
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Thu Aug 24 00:02:43 GMT 2023 - 473.4K bytes - Viewed (0) -
docs/en/docs/release-notes.md
Plain Text - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Fri May 03 23:25:42 GMT 2024 - 388.1K bytes - Viewed (1) -
CHANGELOG/CHANGELOG-1.25.md
- [Important Security Information](#important-security-information-1) - [CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3955-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation) - [CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3676-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Thu Nov 16 11:30:31 GMT 2023 - 419K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.26.md
- [Important Security Information](#important-security-information-1) - [CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3955-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation) - [CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3676-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Thu Mar 14 16:24:51 GMT 2024 - 425.7K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.28.md
- [Important Security Information](#important-security-information-2) - [CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3955-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation) - [CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3676-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Tue Apr 16 20:44:48 GMT 2024 - 385.1K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/es/user/cbean/cq/bs/BsUserCQ.java
/* * Copyright 2012-2024 CodeLibs Project and the Others. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS,
Java - Registered: Mon May 06 08:04:11 GMT 2024 - Last Modified: Thu Feb 22 01:37:57 GMT 2024 - 326.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.27.md
- [Important Security Information](#important-security-information-2) - [CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3955-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation) - [CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3676-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation)
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Tue Apr 16 15:20:21 GMT 2024 - 434.3K bytes - Viewed (3)