[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 196303 Download | Alert*

GRPC for low-memory environments. The existing grpc-go project requires a lot of memory overhead for importing packages and at runtime. While this is great for many services with low density requirements, this can be a problem when running a large number of services on a single machine or on a machine with a small amount of memory. Using the same GRPC definitions, this project reduces the binary s ...

Containerd is an industry-standard container runtime with an emphasis on simplicity, robustness and portability. It is available as a daemon for Linux and Windows, which can manage the complete container lifecycle of its host system: image transfer and storage, container execution and supervision, low-level storage and network attachments, etc.

GRPC for low-memory environments. The existing grpc-go project requires a lot of memory overhead for importing packages and at runtime. While this is great for many services with low density requirements, this can be a problem when running a large number of services on a single machine or on a machine with a small amount of memory. Using the same GRPC definitions, this project reduces the binary s ...

The host is installed with Docker before 19.03.15 or 20.x before 20.10.3 and is prone to a path traversal vulnerability. A flaw is present in the application, which fails to handle an issue in --userns-remap option. Successful exploitation could allow attackers to perform privilege escalation to real root via remapped root.

The host is installed with Docker before 19.03.15 or 20.x before 20.10.3 and is prone to a denial-of-service vulnerability. A flaw is present in the application, which fails to handle a malformed Docker image manifest. Successful exploitation could allow attackers to crash the dockerd daemon.

A flaw was found in the `userns-remap` feature of Docker. The root user in the remapped namespace can modify files under /var/lib/docker/remapping, leading to possible privilege escalation to the root user in the host. The highest threat from this vulnerability is to data integrity. A flaw was found in Docker. Pulling an intentionally malformed Docker image manifest could lead to a crash of the `d ...

A flaw was found in the `userns-remap` feature of Docker. The root user in the remapped namespace can modify files under /var/lib/docker/lt;remappinggt;, leading to possible privilege escalation to the root user in the host. The highest threat from this vulnerability is to data integrity. A flaw was found in Docker. Pulling an intentionally malformed Docker image manifest could lead to a crash of ...

A flaw was found in the `userns-remap` feature of Docker. The root user in the remapped namespace can modify files under /var/lib/docker/less than or remappinggreater than , leading to possible privilege escalation to the root user in the host. The highest threat from this vulnerability is to data integrity. A flaw was found in Docker. Pulling an intentionally malformed Docker image manifest could ...

A flaw was found in containerd CRI plugin. Containers launched through containerd#39;s CRI implementation that share the same image may receive incorrect environment variables, including values that are defined for other containers. The highest threat from this vulnerability is to data confidentiality

A flaw was found in containerd CRI plugin. Containers launched through containerd#39;s CRI implementation that share the same image may receive incorrect environment variables, including values that are defined for other containers. The highest threat from this vulnerability is to data confidentiality


Pages:      Start    8957    8958    8959    8960    8961    8962    8963    8964    8965    8966    8967    8968    8969    8970    ..   19630

© SecPod Technologies