Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 1 - 2 of 2 for vulnerable (0.06 seconds)

  1. android/guava/src/com/google/common/io/InsecureRecursiveDeleteException.java

    import org.jspecify.annotations.Nullable;
    
    /**
     * Exception indicating that a recursive delete can't be performed because the file system does not
     * have the support necessary to guarantee that it is not vulnerable to race conditions that would
     * allow it to delete files and directories outside of the directory being deleted (i.e., {@link
     * SecureDirectoryStream} is not supported).
     *
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Sun Dec 22 03:38:46 GMT 2024
    - 1.9K bytes
    - Click Count (0)
  2. okhttp-tls/src/main/kotlin/okhttp3/tls/HandshakeCertificates.kt

            Collections.addAll(trustedCertificates, *platformTrustManager.acceptedIssuers)
          }
    
        /**
         * Configures this to not authenticate the HTTPS server on to [hostname]. This makes the user
         * vulnerable to man-in-the-middle attacks and should only be used only in private development
         * environments and only to carry test data.
         *
         * The server’s TLS certificate **does not need to be signed** by a trusted certificate
    Created: Fri Apr 03 11:42:14 GMT 2026
    - Last Modified: Sat May 10 11:15:14 GMT 2025
    - 8.4K bytes
    - Click Count (0)
Back to Top