- Sort Score
- Result 10 results
- Languages All
Results 1 - 7 of 7 for Traversal (0.25 sec)
-
analysis/analysis-api-fe10/src/org/jetbrains/kotlin/analysis/api/descriptors/utils/InlineDelegatedPropertyAccessorsAnalyzer.kt
// reachable from files that will be compiled, and include files these inline accessors // to the set of files that will be compiled (and do the same for these files recursively). // As it's basically a DAG traversal, we can keep a queue instead of making recursive calls. val allFiles = this val filesQueueToAnalyze = ArrayDeque(allFiles)
Plain Text - Registered: Fri Apr 26 08:18:10 GMT 2024 - Last Modified: Tue Aug 29 23:55:31 GMT 2023 - 3.6K bytes - Viewed (0) -
manifests/charts/istio-control/istio-discovery/templates/NOTES.txt
"istiocoredns.enabled" "the in-proxy DNS capturing (ISTIO_META_DNS_CAPTURE)" }} {{- range $dep, $replace := $deps }} {{- /* Complex logic to turn the string above into a null-safe traversal like ((.Values.global).certificates */}} {{- $res := tpl (print "{{" (repeat (split "." $dep | len) "(") ".Values." (replace "." ")." $dep) ")}}") $}} {{- if not (eq $res "")}}
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Wed Apr 17 16:38:47 GMT 2024 - 4.2K bytes - Viewed (0) -
okhttp/src/main/kotlin/okhttp3/HttpUrl.kt
* System.out.println(new URI(attack).getPath()); * System.out.println(HttpUrl.parse(attack).encodedPath()); * ``` * * By canonicalizing the input paths, they are complicit in directory traversal attacks. Code that * checks only the path prefix may suffer! * * ``` * /static/images/../../../../../etc/passwd * /static/images/../../../../../etc/passwd * /etc/passwd * ``` *
Plain Text - Registered: Fri May 03 11:42:14 GMT 2024 - Last Modified: Tue Jan 09 12:33:05 GMT 2024 - 63.5K bytes - Viewed (1) -
CHANGELOG/CHANGELOG-1.13.md
## Changelog since v1.13.8 * Fix CVE-2019-11249: Incomplete fixes for CVE-2019-1002101 and CVE-2019-11246, kubectl cp potential directory traversal ([#80436](https://github.com/kubernetes/kubernetes/pull/80436)) * Fix CVE-2019-11247: API server allows access to custom resources via wrong scope ([#80750](https://github.com/kubernetes/kubernetes/pull/80750))
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Thu May 05 13:44:43 GMT 2022 - 273.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.16.md
### CLI - Fix CVE-2019-11249: Incomplete fixes for CVE-2019-1002101 and CVE-2019-11246, kubectl cp potential directory traversal ([#80436](https://github.com/kubernetes/kubernetes/pull/80436), [@M00nF1sh](https://github.com/M00nF1sh))
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Thu Feb 11 10:00:57 GMT 2021 - 345.2K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.15.md
## Changelog since v1.15.1 * Fix CVE-2019-11249: Incomplete fixes for CVE-2019-1002101 and CVE-2019-11246, kubectl cp potential directory traversal ([#80436](https://github.com/kubernetes/kubernetes/pull/80436)) * Fix CVE-2019-11247: API server allows access to custom resources via wrong scope ([#80750](https://github.com/kubernetes/kubernetes/pull/80750))
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Thu May 05 13:44:43 GMT 2022 - 278.9K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.14.md
## Changelog since v1.14.4 * Fix CVE-2019-11249: Incomplete fixes for CVE-2019-1002101 and CVE-2019-11246, kubectl cp potential directory traversal ([#80436](https://github.com/kubernetes/kubernetes/pull/80436)) * Fix CVE-2019-11247: API server allows access to custom resources via wrong scope ([#80750](https://github.com/kubernetes/kubernetes/pull/80750))
Plain Text - Registered: Fri May 03 09:05:14 GMT 2024 - Last Modified: Mon Jun 14 22:06:39 GMT 2021 - 271.5K bytes - Viewed (0)