Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 6 of 6 for vulnerable (0.1 sec)

  1. android/guava/src/com/google/common/io/InsecureRecursiveDeleteException.java

    import javax.annotation.CheckForNull;
    
    /**
     * Exception indicating that a recursive delete can't be performed because the file system does not
     * have the support necessary to guarantee that it is not vulnerable to race conditions that would
     * allow it to delete files and directories outside of the directory being deleted (i.e., {@link
     * SecureDirectoryStream} is not supported).
     *
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Thu Oct 31 16:07:00 UTC 2024
    - 1.9K bytes
    - Viewed (0)
  2. okhttp-tls/src/main/kotlin/okhttp3/tls/HandshakeCertificates.kt

            Collections.addAll(trustedCertificates, *platformTrustManager.acceptedIssuers)
          }
    
        /**
         * Configures this to not authenticate the HTTPS server on to [hostname]. This makes the user
         * vulnerable to man-in-the-middle attacks and should only be used only in private development
         * environments and only to carry test data.
         *
         * The server’s TLS certificate **does not need to be signed** by a trusted certificate
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 8.5K bytes
    - Viewed (0)
  3. compat/maven-plugin-api/src/main/java/org/apache/maven/plugin/descriptor/PluginDescriptor.java

            if (getMojos() == null) {
                return null; // no mojo in this POM
            }
    
            // TODO could we use a map? Maybe if the parent did that for components too, as this is too vulnerable to
            // changes above not being propagated to the map
            for (MojoDescriptor desc : getMojos()) {
                if (goal.equals(desc.getGoal())) {
                    return desc;
                }
            }
    Registered: Sun Nov 03 03:35:11 UTC 2024
    - Last Modified: Fri Oct 25 12:31:46 UTC 2024
    - 16.2K bytes
    - Viewed (0)
  4. CHANGELOG/CHANGELOG-1.24.md

        - [CVE-2021-25749: <code>runAsNonRoot</code> logic bypass for Windows containers](#cve-2021-25749-runasnonroot-logic-bypass-for-windows-containers)
        - [Am I vulnerable?](#am-i-vulnerable)
          - [Affected Versions](#affected-versions)
        - [How do I mitigate this vulnerability?](#how-do-i-mitigate-this-vulnerability)
          - [Fixed Versions](#fixed-versions)
        - [Detection](#detection)
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Thu Aug 24 00:02:43 UTC 2023
    - 473.4K bytes
    - Viewed (0)
  5. CHANGELOG/CHANGELOG-1.22.md

        - [CVE-2021-25749: <code>runAsNonRoot</code> logic bypass for Windows containers](#cve-2021-25749-runasnonroot-logic-bypass-for-windows-containers)
        - [Am I vulnerable?](#am-i-vulnerable)
          - [Affected Versions](#affected-versions)
        - [How do I mitigate this vulnerability?](#how-do-i-mitigate-this-vulnerability)
          - [Fixed Versions](#fixed-versions)
        - [Detection](#detection)
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Tue Dec 13 12:43:45 UTC 2022
    - 454.1K bytes
    - Viewed (0)
  6. CHANGELOG/CHANGELOG-1.23.md

    This issue has been rated low and assigned CVE-2021-25749
    
    **Am I vulnerable?**
    
    All Kubernetes clusters with following versions, running Windows workloads with `runAsNonRoot` are impacted
    
    **Affected Versions**:
    
    - kubelet v1.20 - v1.21
    - kubelet v1.22.0 - v1.22.13
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Tue Feb 28 21:06:52 UTC 2023
    - 424.5K bytes
    - Viewed (0)
Back to top