Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for vulnerable (0.09 sec)

  1. android/guava/src/com/google/common/io/InsecureRecursiveDeleteException.java

    import javax.annotation.CheckForNull;
    
    /**
     * Exception indicating that a recursive delete can't be performed because the file system does not
     * have the support necessary to guarantee that it is not vulnerable to race conditions that would
     * allow it to delete files and directories outside of the directory being deleted (i.e., {@link
     * SecureDirectoryStream} is not supported).
     *
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Thu Oct 31 16:07:00 UTC 2024
    - 1.9K bytes
    - Viewed (0)
  2. build-logic-commons/build-platform/build.gradle.kts

            }
            api("org.apache.pdfbox:pdfbox:2.0.24") {
                because("Flexmark 0.34.60 brings in a vulnerable version of pdfbox")
            }
            api("com.google.code.findbugs:jsr305:3.0.2")
            api("commons-io:commons-io:2.14.0")
            api("commons-lang:commons-lang:2.6")
            api("javax.activation:activation:1.1.1")
    Registered: Wed Nov 06 11:36:14 UTC 2024
    - Last Modified: Tue Oct 29 21:53:00 UTC 2024
    - 4.8K bytes
    - Viewed (0)
  3. okhttp-tls/src/main/kotlin/okhttp3/tls/HandshakeCertificates.kt

            Collections.addAll(trustedCertificates, *platformTrustManager.acceptedIssuers)
          }
    
        /**
         * Configures this to not authenticate the HTTPS server on to [hostname]. This makes the user
         * vulnerable to man-in-the-middle attacks and should only be used only in private development
         * environments and only to carry test data.
         *
         * The server’s TLS certificate **does not need to be signed** by a trusted certificate
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 8.5K bytes
    - Viewed (0)
Back to top