- Sort Score
- Result 10 results
- Languages All
Results 1 - 2 of 2 for offline (0.19 sec)
-
SECURITY.md
and you'll receive a more detailed response to your email within 72 hours indicating the next steps in handling your report. Please, provide a detailed explanation of the issue. In particular, outline the type of the security issue (DoS, authentication bypass, information disclose, ...) and the assumptions you're making (e.g. do you need access credentials for a successful exploit).
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sat Feb 12 00:51:25 GMT 2022 - 2.2K bytes - Viewed (0) -
SECURITY.md
document also outlines what issues we consider as TensorFlow security vulnerabilities. We recognize issues as vulnerabilities only when they occur in scenarios that we outline as safe; issues that have a security impact only when TensorFlow is used in a discouraged way (e.g. running untrusted models or checkpoints, data parsing outside of the safe formats, etc.) are not treated as vulnerabilities..
Plain Text - Registered: Tue Apr 30 12:39:09 GMT 2024 - Last Modified: Sun Oct 01 06:06:35 GMT 2023 - 9.6K bytes - Viewed (0)