- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 37 for vulnerabilities (0.06 seconds)
-
SECURITY.md
implementation bugs that might allow attackers to leave malicious code running and leak or tamper with applications from other users. Please report vulnerabilities to the vendor of the affected hardware accelerator. ## Reporting vulnerabilities ### Vulnerabilities in TensorFlow This document covers different use cases for TensorFlow together with comments
Created: Tue Dec 30 12:39:10 GMT 2025 - Last Modified: Wed Oct 16 16:10:43 GMT 2024 - 9.6K bytes - Click Count (0) -
.github/ISSUE_TEMPLATE/config.yml
blank_issues_enabled: false contact_links: - name: Security Contact about: Please report security vulnerabilities to ******@****.*** - name: Question or Problem about: Ask a question or ask about a problem in GitHub Discussions. url: https://github.com/fastapi/fastapi/discussions/categories/questions - name: Feature RequestCreated: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Mon Jul 29 23:35:07 GMT 2024 - 926 bytes - Click Count (0) -
RELEASE.md
* Fixes vulnerabilities caused by incomplete validation in `SparseAdd` ([CVE-2021-29609](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29609)) * Fixes vulnerabilities caused by incomplete validation in `SparseSparseMinimum` ([CVE-2021-29607](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29607)) * Fixes vulnerabilities caused by incomplete validation in `SparseReshape`Created: Tue Dec 30 12:39:10 GMT 2025 - Last Modified: Tue Oct 28 22:27:41 GMT 2025 - 740.4K bytes - Click Count (3) -
.github/workflows/codeql-analysis.yml
# Supported options are ['csharp', 'cpp', 'go', 'java', 'javascript', 'python'] language: ['java'] # Learn more... # https://docs.github.com/en/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#overriding-automatic-language-detection steps: - name: Checkout repository uses: actions/checkout@v4 # Initializes the CodeQL tools for scanning.
Created: Sat Dec 20 09:13:53 GMT 2025 - Last Modified: Thu Nov 20 13:34:13 GMT 2025 - 2.1K bytes - Click Count (0) -
architecture/standards/0002-avoid-using-java-serialization.md
- **Security:** Java serialization poses security risks, especially related to deserialization vulnerabilities. - **Version Compatibility:** With Java serialization, even minor changes to a class (like adding a field) can break compatibility. - **Cross-Language Compatibility:**
Created: Wed Dec 31 11:36:14 GMT 2025 - Last Modified: Thu Feb 29 22:32:18 GMT 2024 - 2.3K bytes - Click Count (0) -
.github/workflows/codeql-analysis.yml
# Supported options are ['csharp', 'cpp', 'go', 'java', 'javascript', 'python'] language: ['java', 'javascript'] # Learn more... # https://docs.github.com/en/github/finding-security-vulnerabilities-and-errors-in-your-code/configuring-code-scanning#overriding-automatic-language-detection steps: - name: Checkout repository uses: actions/checkout@v6
Created: Wed Dec 31 11:36:14 GMT 2025 - Last Modified: Thu Dec 11 22:12:03 GMT 2025 - 4K bytes - Click Count (0) -
src/main/java/org/codelibs/fess/ds/DataStoreFactory.java
* in the data store plugin directory and extracts component class names. * * <p>The method uses secure XML parsing features to prevent XXE attacks and * other XML-based vulnerabilities. Component class names are extracted from * the 'class' attribute of 'component' elements in the XML files.</p> * * @return sorted list of data store class simple names discovered from plugins */Created: Sat Dec 20 09:19:18 GMT 2025 - Last Modified: Fri Nov 28 16:29:12 GMT 2025 - 9K bytes - Click Count (0) -
src/main/java/org/codelibs/fess/crawler/serializer/DataSerializer.java
// TODO use kryo.register for security // SECURITY WARNING: setRegistrationRequired(false) allows deserialization of arbitrary classes // which could potentially lead to remote code execution vulnerabilities. // This should be replaced with explicit class registration using kryo.register() // for all classes that need to be serialized/deserialized. kryo.setRegistrationRequired(false);Created: Sat Dec 20 09:19:18 GMT 2025 - Last Modified: Wed Nov 19 07:09:17 GMT 2025 - 6.5K bytes - Click Count (3) -
CONTRIBUTING.md
Please note that some features may be out of the team's current focus, and it can take significant time for the team to review the PR thoroughly and address it fully. ### Security vulnerabilities Do not report security vulnerabilities to the public issue tracker. Follow our [Security Vulnerability Disclosure Policy](https://github.com/gradle/gradle/security/policy). ### Follow the Code of Conduct
Created: Wed Dec 31 11:36:14 GMT 2025 - Last Modified: Tue Nov 25 06:57:22 GMT 2025 - 19K bytes - Click Count (0) -
src/main/java/org/codelibs/core/io/SerializeUtil.java
* <p> * WARNING: Use this only when you completely trust the data source and have * other security measures in place. Unrestricted deserialization can lead to * remote code execution vulnerabilities. * </p> * * @return an ObjectInputFilter that allows all classes */ public static ObjectInputFilter createPermissiveFilter() {Created: Sat Dec 20 08:55:33 GMT 2025 - Last Modified: Sat Nov 22 11:21:59 GMT 2025 - 9K bytes - Click Count (0)