- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 124 for attacker (0.03 sec)
-
LICENSES/vendor/cyphar.com/go-pathrs/LICENSE
1.4. "Covered Software" means Source Code Form to which the initial Contributor has attached the notice in Exhibit A, the Executable Form of such Source Code Form, and Modifications of such Source Code Form, in each case including portions thereof. 1.5. "Incompatible With Secondary Licenses" means (a) that the initial Contributor has attached the notice described in Exhibit B to the Covered Software; or
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Wed Nov 12 14:46:31 UTC 2025 - 16.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.2.md
* If a node or kubelet crashes with a volume attached, the volume will remain attached to that node. If that volume can only be attached to one node at a time (GCE PDs attached in RW mode, for example), then the volume must be manually detached before Kubernetes can attach it to other nodes. * If a volume is already attached to a node any subsequent attempts to attach it
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Fri Dec 04 06:36:19 UTC 2020 - 41.4K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.25.md
### CVE-2022-3172: Aggregated API server can cause clients to be redirected (SSRF) A security issue was discovered in kube-apiserver that could allow an attacker controlled aggregated API server to redirect client traffic to any URL. This could lead to the client performing unexpected actions as well as leaking the client's credentials to third parties.
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Mon May 06 09:23:20 UTC 2024 - 419.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.3.md
* Specifically the new controller watches the API server for scheduled pods. It processes each pod and ensures that any volumes that implement the volume Attacher interface are attached to the node their pod is scheduled to.
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Thu Dec 24 02:28:26 UTC 2020 - 84K bytes - Viewed (0) -
LICENSES/vendor/github.com/containerd/errdefs/pkg/LICENSE
"Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below). "Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which theRegistered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Wed Mar 05 11:36:39 UTC 2025 - 10.7K bytes - Viewed (0) -
docs/contribute/code_of_conduct.md
documentation may negatively impact others. * **Be respectful**: We expect people to work together to resolve conflict, assume good intentions, and act with empathy. Do not turn disagreements into personal attacks. * **Be collaborative**: Collaboration reduces redundancy and improves the quality of our work. We strive for transparency within our open source community, and we work closely with upstream
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Sun Feb 06 02:19:09 UTC 2022 - 5.1K bytes - Viewed (0) -
src/main/java/jcifs/util/AuthenticationRateLimiter.java
import java.util.concurrent.atomic.AtomicLong; import org.slf4j.Logger; import org.slf4j.LoggerFactory; import jcifs.smb.SmbException; /** * Rate limiter for authentication attempts to prevent brute force attacks. * * Features: * - Per-account rate limiting * - Per-IP rate limiting * - Global rate limiting * - Exponential backoff for repeated failures * - Account lockout after threshold
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 15.1K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb2/Smb2EncryptionContext.java
constantTimeCopy(output, message.length, authTag, 0, tagLength); return new EncryptionResult(ciphertext, authTag); } /** * Perform constant-time encryption to prevent timing attacks */ private byte[] performConstantTimeEncryption(Cipher cipher, byte[] message) throws Exception { // Pad to fixed block size to prevent timing leaks int blockSize = cipher.getBlockSize();
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 35.5K bytes - Viewed (0) -
src/main/java/jcifs/smb/NtStatus.java
"A notify change request is being completed.", "The data was too large to fit into the specified buffer.", "A device attached to the system is not functioning.", "Incorrect function.", "The parameter is incorrect.", "Invalid access to memory location.", "The handle is invalid.", "The parameter is incorrect.",Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 14.9K bytes - Viewed (0) -
LICENSE
"Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below). "Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which theRegistered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Mon Jan 11 04:26:17 UTC 2021 - 11.1K bytes - Viewed (0)