- Sort Score
- Num 10 results
- Language All
Results 11 - 20 of 54 for privileges (0.07 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
tests/test_tutorial/test_additional_responses/test_tutorial004.py
"404": {"description": "Item not found"}, "302": {"description": "The item was moved"}, "403": {"description": "Not enough privileges"}, "200": { "description": "Successful Response", "content": { "image/png": {},
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Feb 27 10:53:47 GMT 2026 - 5.5K bytes - Click Count (0) -
src/main/java/jcifs/smb1/dcerpc/msrpc/lsarpc.java
/** Security impersonation level. */ public short impersonation_level; /** Context tracking mode. */ public byte context_mode; /** Indicates if only effective privileges should be used. */ public byte effective_only; @Override public void encode(final NdrBuffer _dst) throws NdrException { _dst.align(4); _dst.enc_ndr_long(length);Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 42.5K bytes - Click Count (0) -
docs/fr/docs/tutorial/handling-errors.md
Ce client peut être un navigateur avec un frontend, un code d'un tiers, un appareil IoT, etc. Vous pourriez avoir besoin d'indiquer au client que : * Le client n'a pas les privilèges suffisants pour cette opération. * Le client n'a pas accès à cette ressource. * L'élément auquel le client tentait d'accéder n'existe pas. * etc.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:37:13 GMT 2026 - 10K bytes - Click Count (0) -
android/guava/src/com/google/common/net/InetAddresses.java
* <p>NOTE: This method is failsafe for security purposes: ALL IPv6 addresses (except localhost * (::1)) are hashed to avoid the security risk associated with extracting an embedded IPv4 * address that might permit elevated privileges. * * @param ip {@link InetAddress} to "coerce" * @return {@link Inet4Address} represented "coerced" address * @since 7.0 */ public static Inet4Address getCoercedIPv4Address(InetAddress ip) {
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Thu Mar 19 18:53:45 GMT 2026 - 47.7K bytes - Click Count (0) -
cmd/iam.go
if parentInClaim != parentUser { return false } } else { // This is needed so a malicious user cannot // use a leaked session key of another user // to widen its privileges. return false } isOwnerDerived := parentUser == globalActiveCred.AccessKey var err error var svcPolicies []string roleArn := args.GetRoleArn() switch {Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Wed Oct 15 17:00:45 GMT 2025 - 76.5K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.3.md
* Stop 'kubectl drain' deleting pods with local storage. * Add `kubectl rollout status` * Security/Auth * L7 LB controller and disk attach controllers run on master, so nodes do not need those privileges. * Setting TLS1.2 minimum * `kubectl create secret tls` command * Webhook Token Authenticator * **beta** PodSecurityPolicy objects limits use of security-sensitive features by pods. * Kubectl
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Thu Dec 24 02:28:26 GMT 2020 - 84K bytes - Click Count (0) -
cmd/sts-handlers_test.go
} if len(buckets) != 2 || buckets[0].Name != "bucket1" || buckets[1].Name != "bucket2" { c.Fatalf("restricted STS account should only have access to bucket1 and bucket2") } // Try to escalate privileges restrictedAdmClient := s.getAdminClient(c, value.AccessKeyID, value.SecretAccessKey, value.SessionToken) _, err = restrictedAdmClient.AddServiceAccount(ctx, madmin.AddServiceAccountReq{ AccessKey: "newroot",
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Wed Oct 15 17:00:45 GMT 2025 - 103.4K bytes - Click Count (1) -
CHANGELOG/CHANGELOG-1.28.md
- [CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3955-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation) - [CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3676-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation) - [Changes by Kind](#changes-by-kind-14)Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Fri Sep 05 03:47:18 GMT 2025 - 456.9K bytes - Click Count (1) -
CHANGELOG/CHANGELOG-1.25.md
- [CVE-2023-3955: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3955-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation) - [CVE-2023-3676: Insufficient input sanitization on Windows nodes leads to privilege escalation](#cve-2023-3676-insufficient-input-sanitization-on-windows-nodes-leads-to-privilege-escalation) - [Changes by Kind](#changes-by-kind-2) - [Feature](#feature-2)Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Mon May 06 09:23:20 GMT 2024 - 419.1K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.22.md
CSI support for Windows nodes moves to GA in the 1.22 release. In Kubernetes v1.22, Windows privileged containers are only an alpha feature. To allow using CSI storage on Windows nodes, [CSIProxy](https://github.com/kubernetes-csi/csi-proxy) enables CSI node plugins to be deployed as unprivileged pods, using the proxy to perform privileged storage operations on the node.
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Tue Dec 13 12:43:45 GMT 2022 - 454.1K bytes - Click Count (0)