- Sort Score
- Result 10 results
- Languages All
Results 1 - 3 of 3 for vulnerable (0.06 sec)
-
android/guava/src/com/google/common/io/InsecureRecursiveDeleteException.java
import javax.annotation.CheckForNull; /** * Exception indicating that a recursive delete can't be performed because the file system does not * have the support necessary to guarantee that it is not vulnerable to race conditions that would * allow it to delete files and directories outside of the directory being deleted (i.e., {@link * SecureDirectoryStream} is not supported). *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Oct 31 16:07:00 UTC 2024 - 1.9K bytes - Viewed (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HandshakeCertificates.kt
Collections.addAll(trustedCertificates, *platformTrustManager.acceptedIssuers) } /** * Configures this to not authenticate the HTTPS server on to [hostname]. This makes the user * vulnerable to man-in-the-middle attacks and should only be used only in private development * environments and only to carry test data. * * The server’s TLS certificate **does not need to be signed** by a trusted certificate
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 8.5K bytes - Viewed (0) -
compat/maven-plugin-api/src/main/java/org/apache/maven/plugin/descriptor/PluginDescriptor.java
if (getMojos() == null) { return null; // no mojo in this POM } // TODO could we use a map? Maybe if the parent did that for components too, as this is too vulnerable to // changes above not being propagated to the map for (MojoDescriptor desc : getMojos()) { if (goal.equals(desc.getGoal())) { return desc; } }
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 16.2K bytes - Viewed (0)