- Sort Score
- Result 10 results
- Languages All
Results 1 - 7 of 7 for delicious (0.12 sec)
-
SECURITY.md
BMP, GIF, WAV, RAW, RAW\_PADDED, CSV and PROTO formats. All other input formats, including tensorflow-io should be sandboxed if used to process untrusted data. For example, if an attacker were to upload a malicious video file, they could potentially exploit a vulnerability in the TensorFlow code that handles videos, which could allow them to execute arbitrary code on the system running TensorFlow.
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0) -
README.md
otherwise. Do not persist these and assume they can be read by a future version of the library. 5. Our classes are not designed to protect against a malicious caller. You should not use them for communication between trusted and untrusted code. 6. For the mainline flavor, we test the libraries using OpenJDK 8, 11, and 17
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Sep 24 18:34:38 UTC 2024 - 5.9K bytes - Viewed (0) -
cmd/generic-handlers.go
switch strings.TrimSpace(p) { case dotdotComponent: return true case dotComponent: return true } } return false } // Check if client is sending a malicious request. func hasMultipleAuth(r *http.Request) bool { authTypeCount := 0 for _, hasValidAuth := range []func(*http.Request) bool{ isRequestSignatureV2, isRequestPresignedSignatureV2,
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon Jul 29 18:10:04 UTC 2024 - 20.5K bytes - Viewed (0) -
cmd/iam.go
if ok { parentInClaim, ok := p.(string) if !ok { // Reject malformed/malicious requests. return false } // The parent claim in the session token should be equal // to the parent detected in the backend if parentInClaim != parentUser { return false } } else { // This is needed so a malicious user cannot // use a leaked session key of another user // to widen its privileges.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Oct 29 16:01:48 UTC 2024 - 74.6K bytes - Viewed (0) -
android/guava/src/com/google/common/io/ByteSource.java
* * <p>Note that the given byte array may be passed directly to methods on, for example, {@code * OutputStream} (when {@code copyTo(OutputStream)} is called on the resulting {@code * ByteSource}). This could allow a malicious {@code OutputStream} implementation to modify the * contents of the array, but provides better performance in the normal case. * * @since 15.0 (since 14.0 as {@code ByteStreams.asByteSource(byte[])}). */
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Sat Oct 19 00:26:48 UTC 2024 - 26.2K bytes - Viewed (0) -
src/archive/zip/reader.go
} } // Assume that uncompressed size 2³²-1 could plausibly happen in // an old zip32 file that was sharding inputs into the largest chunks // possible (or is just malicious; search the web for 42.zip). // If needUSize is true still, it means we didn't see a zip64 extension. // As long as the compressed size is not also 2³²-1 (implausible) // and the header is not also 2³²-1 (equally implausible),
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Sat Aug 03 01:05:29 UTC 2024 - 28.1K bytes - Viewed (0) -
docs/en/docs/release-notes.md
* 📝 Reword in docs, from "have in mind" to "keep in mind". PR [#10376](https://github.com/tiangolo/fastapi/pull/10376) by [@malicious](https://github.com/malicious). * 📝 Add External Link: Talk by Jeny Sadadia. PR [#10265](https://github.com/tiangolo/fastapi/pull/10265) by [@JenySadadia](https://github.com/JenySadadia).
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Fri Nov 01 11:25:57 UTC 2024 - 460.3K bytes - Viewed (0)