Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 29 for malicious (0.17 sec)

  1. SECURITY.md

    BMP, GIF, WAV, RAW, RAW\_PADDED, CSV and PROTO formats. All other input formats,
    including tensorflow-io should be sandboxed if used to process untrusted data.
    
    For example, if an attacker were to upload a malicious video file, they could
    potentially exploit a vulnerability in the TensorFlow code that handles videos,
    which could allow them to execute arbitrary code on the system running
    TensorFlow.
    
    Registered: Sun Jun 16 05:45:23 UTC 2024
    - Last Modified: Sun Oct 01 06:06:35 UTC 2023
    - 9.6K bytes
    - Viewed (0)
  2. subprojects/core/src/main/java/org/gradle/initialization/exception/DefaultExceptionAnalyser.java

            Throwable locationAware = null;
            Throwable result = null;
            Throwable contextMatch = null;
            // Guard against malicious overrides of Throwable.equals by
            // using a Set with identity equality semantics.
            Set<Throwable> dejaVu = Collections.newSetFromMap(new IdentityHashMap<>());
    Registered: Wed Jun 12 18:38:38 UTC 2024
    - Last Modified: Fri Mar 01 13:10:04 UTC 2024
    - 6.2K bytes
    - Viewed (0)
  3. README.md

        otherwise. Do not persist these and assume they can be read by a future
        version of the library.
    
    5.  Our classes are not designed to protect against a malicious caller. You
        should not use them for communication between trusted and untrusted code.
    
    6.  For the mainline flavor, we test the libraries using OpenJDK 8, 11, and 17
    Registered: Wed Jun 12 16:38:11 UTC 2024
    - Last Modified: Fri May 31 17:43:52 UTC 2024
    - 5.9K bytes
    - Viewed (0)
  4. platforms/core-execution/build-cache-http/src/main/java/org/gradle/caching/http/HttpBuildCache.java

         * and gives an attacker the ability to
         * <a href="https://max.computer/blog/how-to-take-over-the-computer-of-any-java-or-clojure-or-scala-developer/">serve malicious executable code onto the system.</a>
         * </b>
         * <p>
         * See also:
    Registered: Wed Jun 12 18:38:38 UTC 2024
    - Last Modified: Fri Sep 22 09:43:12 UTC 2023
    - 7.6K bytes
    - Viewed (0)
  5. platforms/software/dependency-management/src/integTest/groovy/org/gradle/integtests/resolve/CacheResolveIntegrationTest.groovy

            // If we have the real hash of a JAR in those other coordinates, Gradle could overwrite and replace the real JAR with a malicious one
            !invalidLocation.exists()
        }
    
        def 'cannot write cache entries outside of dependency cache'() {
            given:
            def fakeDep = temporaryFolder.testDirectory.file('fake-repo/pwned.txt')
    Registered: Wed Jun 12 18:38:38 UTC 2024
    - Last Modified: Fri Mar 22 01:27:55 UTC 2024
    - 9.7K bytes
    - Viewed (0)
  6. cmd/generic-handlers.go

    		switch strings.TrimSpace(p) {
    		case dotdotComponent:
    			return true
    		case dotComponent:
    			return true
    		}
    	}
    	return false
    }
    
    // Check if client is sending a malicious request.
    func hasMultipleAuth(r *http.Request) bool {
    	authTypeCount := 0
    	for _, hasValidAuth := range []func(*http.Request) bool{
    		isRequestSignatureV2, isRequestPresignedSignatureV2,
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Thu Jun 06 01:01:15 UTC 2024
    - 20.4K bytes
    - Viewed (0)
  7. src/syscall/exec_unix.go

    // pipe, accept on a socket, and so on. We can't reasonably grab
    // the lock across those operations.
    //
    // It is worse to inherit some file descriptors than others.
    // If a non-malicious child accidentally inherits an open ordinary file,
    // that's not a big deal. On the other hand, if a long-lived child
    // accidentally inherits the write end of a pipe, then the reader
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Feb 26 21:03:59 UTC 2024
    - 8.7K bytes
    - Viewed (0)
  8. src/net/http/internal/chunked.go

    	r        *bufio.Reader
    	n        uint64 // unread bytes in chunk
    	err      error
    	buf      [2]byte
    	checkEnd bool  // whether need to check for \r\n chunk footer
    	excess   int64 // "excessive" chunk overhead, for malicious sender detection
    }
    
    func (cr *chunkedReader) beginChunk() {
    	// chunk-size CRLF
    	var line []byte
    	line, cr.err = readChunkLine(cr.r)
    	if cr.err != nil {
    		return
    	}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed Jan 10 03:29:50 UTC 2024
    - 7.8K bytes
    - Viewed (0)
  9. platforms/documentation/docs/src/docs/userguide/dep-man/01-core-dependency-management/dependency_verification.adoc

    Dependency verification is about **trust** in what you get and what you ship.
    
    Without dependency verification it's easy for an attacker to compromise your supply chain.
    There are many real world examples of tools compromised by adding a malicious dependency.
    Dependency verification is meant to protect yourself from those attacks, by forcing you to ensure that the artifacts you include in your build are the ones that you expect.
    Registered: Wed Jun 12 18:38:38 UTC 2024
    - Last Modified: Wed Feb 07 20:36:31 UTC 2024
    - 56.7K bytes
    - Viewed (0)
  10. staging/src/k8s.io/apiserver/pkg/server/secure_serving.go

    	if s.HTTP2MaxStreamsPerConnection > 0 {
    		http2Options.MaxConcurrentStreams = uint32(s.HTTP2MaxStreamsPerConnection)
    	} else {
    		// match http2.initialMaxConcurrentStreams used by clients
    		// this makes it so that a malicious client can only open 400 streams before we forcibly close the connection
    		// https://github.com/golang/net/commit/b225e7ca6dde1ef5a5ae5ce922861bda011cfabd
    		http2Options.MaxConcurrentStreams = 100
    	}
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Oct 12 20:54:07 UTC 2023
    - 10.3K bytes
    - Viewed (0)
Back to top