Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 2 of 2 for outlined (0.15 sec)

  1. SECURITY.md

    and you'll receive a more detailed response to your email within 72 hours indicating the next steps
    in handling your report.
    
    Please, provide a detailed explanation of the issue. In particular, outline the type of the security
    issue (DoS, authentication bypass, information disclose, ...) and the assumptions you're making (e.g. do
    you need access credentials for a successful exploit).
    
    Plain Text
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Sat Feb 12 00:51:25 GMT 2022
    - 2.2K bytes
    - Viewed (0)
  2. SECURITY.md

    some form of isolation when dealing with untrusted data. As a result, this
    document also outlines what issues we consider as TensorFlow security
    vulnerabilities.
    
    We recognize issues as vulnerabilities only when they occur in scenarios that we
    outline as safe; issues that have a security impact only when TensorFlow is used
    Plain Text
    - Registered: Tue Apr 30 12:39:09 GMT 2024
    - Last Modified: Sun Oct 01 06:06:35 GMT 2023
    - 9.6K bytes
    - Viewed (0)
Back to top