Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 5 of 5 for delicious (0.14 sec)

  1. SECURITY.md

    BMP, GIF, WAV, RAW, RAW\_PADDED, CSV and PROTO formats. All other input formats,
    including tensorflow-io should be sandboxed if used to process untrusted data.
    
    For example, if an attacker were to upload a malicious video file, they could
    potentially exploit a vulnerability in the TensorFlow code that handles videos,
    which could allow them to execute arbitrary code on the system running
    TensorFlow.
    
    Registered: Tue Nov 05 12:39:12 UTC 2024
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
  2. README.md

        otherwise. Do not persist these and assume they can be read by a future
        version of the library.
    
    5.  Our classes are not designed to protect against a malicious caller. You
        should not use them for communication between trusted and untrusted code.
    
    6.  For the mainline flavor, we test the libraries using OpenJDK 8, 11, and 17
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue Sep 24 18:34:38 UTC 2024
    - 5.9K bytes
    - Viewed (0)
  3. cmd/iam.go

    	if ok {
    		parentInClaim, ok := p.(string)
    		if !ok {
    			// Reject malformed/malicious requests.
    			return false
    		}
    		// The parent claim in the session token should be equal
    		// to the parent detected in the backend
    		if parentInClaim != parentUser {
    			return false
    		}
    	} else {
    		// This is needed so a malicious user cannot
    		// use a leaked session key of another user
    		// to widen its privileges.
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Oct 29 16:01:48 UTC 2024
    - 74.6K bytes
    - Viewed (0)
  4. android/guava/src/com/google/common/io/ByteSource.java

       *
       * <p>Note that the given byte array may be passed directly to methods on, for example, {@code
       * OutputStream} (when {@code copyTo(OutputStream)} is called on the resulting {@code
       * ByteSource}). This could allow a malicious {@code OutputStream} implementation to modify the
       * contents of the array, but provides better performance in the normal case.
       *
       * @since 15.0 (since 14.0 as {@code ByteStreams.asByteSource(byte[])}).
       */
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Sat Oct 19 00:26:48 UTC 2024
    - 26.2K bytes
    - Viewed (0)
  5. docs/en/docs/release-notes.md

    * 📝 Reword in docs, from "have in mind" to "keep in mind". PR [#10376](https://github.com/tiangolo/fastapi/pull/10376) by [@malicious](https://github.com/malicious).
    * 📝 Add External Link: Talk by Jeny Sadadia. PR [#10265](https://github.com/tiangolo/fastapi/pull/10265) by [@JenySadadia](https://github.com/JenySadadia).
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Fri Nov 01 11:25:57 UTC 2024
    - 460.3K bytes
    - Viewed (0)
Back to top