- Sort Score
- Result 10 results
- Languages All
Results 1041 - 1050 of 1,064 for quer (0.06 sec)
- 
				
				src/main/webapp/js/admin/popper.min.js.map=== 'string') {\n arrowElement = data.instance.popper.querySelector(arrowElement);\n\n // if arrowElement is not found, don't run the modifier\n if (!arrowElement) {\n return data;\n }\n } else {\n // if the arrowElement isn't a query selector we must check that the\n // provided DOM node is child of its popper node\n if (!data.instance.popper.contains(arrowElement)) {\n console.warn(\n 'WARNING: `arrow.element` must be child of its popper element!'\n );\n... Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Sat Oct 26 01:49:09 UTC 2024 - 120.9K bytes - Viewed (0)
- 
				
				CHANGELOG/CHANGELOG-1.31.mdThis release contains changes that address the following vulnerabilities: ### CVE-2024-9042: Command Injection affecting Windows nodes via nodes/*/logs/query API A security vulnerability has been discovered in Kubernetes windows nodes that could allow a user with the ability to query a node's '/logs' endpoint to execute arbitrary commands on the host. **Affected Versions**: - kubelet <= v1.29.12 - kubelet <= v1.30.8 Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Wed Aug 13 19:49:57 UTC 2025 - 429.6K bytes - Viewed (0)
- 
				
				CHANGELOG/CHANGELOG-1.29.mdThis release contains changes that address the following vulnerabilities: ### CVE-2024-9042: Command Injection affecting Windows nodes via nodes/*/logs/query API A security vulnerability has been discovered in Kubernetes windows nodes that could allow a user with the ability to query a node's '/logs' endpoint to execute arbitrary commands on the host. **Affected Versions**: - kubelet <= v1.29.12 - kubelet <= v1.30.8 Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Wed Mar 12 00:36:01 UTC 2025 - 429.6K bytes - Viewed (1)
- 
				
				CHANGELOG/CHANGELOG-1.32.mdThis release contains changes that address the following vulnerabilities: ### CVE-2024-9042: Command Injection affecting Windows nodes via nodes/*/logs/query API A security vulnerability has been discovered in Kubernetes windows nodes that could allow a user with the ability to query a node's '/logs' endpoint to execute arbitrary commands on the host. **Affected Versions**: - kubelet <= v1.29.12 - kubelet <= v1.30.8 Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Wed Aug 13 14:49:49 UTC 2025 - 412.3K bytes - Viewed (0)
- 
				
				CHANGELOG/CHANGELOG-1.10.md* - Fix a bug in DNS resolution for externalName services * and PTR records that need to query from upstream nameserver. * Fix machineID getting for vmss nodes when using instance metadata ([#62611](https://github.com/kubernetes/kubernetes/pull/62611), [@feiskyer](https://github.com/feiskyer))Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Thu May 05 13:44:43 UTC 2022 - 341.8K bytes - Viewed (0)
- 
				
				fess-crawler/src/main/resources/org/codelibs/fess/crawler/mime/tika-mimetypes.xml<glob pattern="*.sldprt" /> <glob pattern="*.sldasm" /> <glob pattern="*.slddrw" /> <sub-class-of type="application/x-tika-msoffice" /> </mime-type> <mime-type type="application/sparql-query"> <glob pattern="*.rq"/> </mime-type> <mime-type type="application/sparql-results+xml"> <glob pattern="*.srx"/> </mime-type> <mime-type type="application/spirits-event+xml"/> Registered: Sun Sep 21 03:50:09 UTC 2025 - Last Modified: Thu Mar 13 08:18:01 UTC 2025 - 320.1K bytes - Viewed (1)
- 
				
				cmd/object-handlers.go} // Read escaped copy source path to check for parameters. cpSrcPath := r.Header.Get(xhttp.AmzCopySource) var vid string if u, err := url.Parse(cpSrcPath); err == nil { vid = strings.TrimSpace(u.Query().Get(xhttp.VersionID)) // Note that url.Parse does the unescaping cpSrcPath = u.Path } srcBucket, srcObject := path2BucketObject(cpSrcPath) Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Sun Sep 07 16:13:09 UTC 2025 - 120.6K bytes - Viewed (0)
- 
				
				CHANGELOG/CHANGELOG-1.30.mdThis release contains changes that address the following vulnerabilities: ### CVE-2024-9042: Command Injection affecting Windows nodes via nodes/*/logs/query API A security vulnerability has been discovered in Kubernetes windows nodes that could allow a user with the ability to query a node's '/logs' endpoint to execute arbitrary commands on the host. **Affected Versions**: - kubelet <= v1.29.12 - kubelet <= v1.30.8 Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Wed Jun 18 18:59:10 UTC 2025 - 398.1K bytes - Viewed (0)
- 
				
				cmd/object-handlers_test.gomkGetReq(oi, "", caseNumber, sf) caseNumber++ // No range requests are possible if the // object length is 0 if objLen == 0 { continue } // Various ranges to query - all are valid! rangeHdrs := []string{ // Read first byte of object fmt.Sprintf("bytes=%d-%d", 0, 0), // Read second byte of object fmt.Sprintf("bytes=%d-%d", 1, 1), Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 163.1K bytes - Viewed (0)
- 
				
				CHANGELOG/CHANGELOG-1.6.md* We change the default attach_detach_controller sync period to 1 minute to reduce the query frequency through cloud provider to check whether volumes are attached or not. ([#41363](https://github.com/kubernetes/kubernetes/pull/41363), [@jingxu97](https://github.com/jingxu97)) ## Changes to Major Components Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Thu Dec 24 02:28:26 UTC 2020 - 304K bytes - Viewed (0)