Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 2 of 2 for offline (0.19 sec)

  1. SECURITY.md

    and you'll receive a more detailed response to your email within 72 hours indicating the next steps
    in handling your report.
    
    Please, provide a detailed explanation of the issue. In particular, outline the type of the security
    issue (DoS, authentication bypass, information disclose, ...) and the assumptions you're making (e.g. do
    you need access credentials for a successful exploit).
    
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Sat Feb 12 00:51:25 GMT 2022
    - 2.2K bytes
    - Viewed (0)
  2. SECURITY.md

    document also outlines what issues we consider as TensorFlow security
    vulnerabilities.
    
    We recognize issues as vulnerabilities only when they occur in scenarios that we
    outline as safe; issues that have a security impact only when TensorFlow is used
    in a discouraged way (e.g. running untrusted models or checkpoints, data parsing
    outside of the safe formats, etc.) are not treated as vulnerabilities..
    
    Plain Text
    - Registered: Tue Apr 30 12:39:09 GMT 2024
    - Last Modified: Sun Oct 01 06:06:35 GMT 2023
    - 9.6K bytes
    - Viewed (0)
Back to top