-
**Is your feature request related to a problem? Please describe.**
Currently, the JFrog CLI allows us to perform a number of tasks to maintain the JFrog Platform and the associated applications havin…
-
### Description
***Issue: 1**
After closing brave and logging out, I kept hearing the laptop fans jetting as if I was compiling a kernel from source. I logged back in, started a terminal and launc…
-
If an attacker has an iframe embedded in the victim page, they can determine some information from the victim page across origins. Using an intersection observer, the attacker can determine if the ifr…
-
If there's a project and someone tries to request to it without the permission. We currently return a 403. This is a security problem as it leaks the existence of the project/comment/post/whatever.
S…
-
**Describe the bug**
Imagine a category with 101 elements and we use 101 fold in TE. Only one row of this category has target 1, rest is 0. Then 0s will have 0.01 as their value and 1 will have 0.0 a…
-
### Prerequisites
- [X] I have read the [Contributing Guidelines](https://github.com/siemens/ix/blob/main/CONTRIBUTING.md).
- [X] I have not leaked any internal/restricted information like screens…
-
你好!我想问下deepar模型里面,test集进行预测第二天数据的时候,对应test的第二个window里面的历史数据部分(前0-195个数据点)是用的真实值吗?
-
### Description
Hi all,
I'm getting a notification from Leakcanary when debugging an app on a Samsung Galaxy S10, running on Android 12.
Indeed, Leakcanary notifies a leaked activity when the…
-
### What happened + What you expected to happen
I am seeing the memory leakage while putting objects (numpy array) into object store via `ray.put()`.
### Versions / Dependencies
I am using `r…
-
The lately introduced credential overwrite protection leaks information about the stored credentials in the PIN-encrypted space, when Update or Register commands are called with the already used crede…