- Sort Score
- Result 10 results
- Languages All
Results 1 - 6 of 6 for vulnerable (0.11 sec)
-
android/guava/src/com/google/common/io/InsecureRecursiveDeleteException.java
import javax.annotation.CheckForNull; /** * Exception indicating that a recursive delete can't be performed because the file system does not * have the support necessary to guarantee that it is not vulnerable to race conditions that would * allow it to delete files and directories outside of the directory being deleted (i.e., {@link * SecureDirectoryStream} is not supported). *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Oct 31 16:07:00 UTC 2024 - 1.9K bytes - Viewed (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HandshakeCertificates.kt
Collections.addAll(trustedCertificates, *platformTrustManager.acceptedIssuers) } /** * Configures this to not authenticate the HTTPS server on to [hostname]. This makes the user * vulnerable to man-in-the-middle attacks and should only be used only in private development * environments and only to carry test data. * * The server’s TLS certificate **does not need to be signed** by a trusted certificate
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 8.5K bytes - Viewed (0) -
compat/maven-plugin-api/src/main/java/org/apache/maven/plugin/descriptor/PluginDescriptor.java
if (getMojos() == null) { return null; // no mojo in this POM } // TODO could we use a map? Maybe if the parent did that for components too, as this is too vulnerable to // changes above not being propagated to the map for (MojoDescriptor desc : getMojos()) { if (goal.equals(desc.getGoal())) { return desc; } }
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 16.2K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.24.md
- [CVE-2021-25749: <code>runAsNonRoot</code> logic bypass for Windows containers](#cve-2021-25749-runasnonroot-logic-bypass-for-windows-containers) - [Am I vulnerable?](#am-i-vulnerable) - [Affected Versions](#affected-versions) - [How do I mitigate this vulnerability?](#how-do-i-mitigate-this-vulnerability) - [Fixed Versions](#fixed-versions) - [Detection](#detection)
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu Aug 24 00:02:43 UTC 2023 - 473.4K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.22.md
- [CVE-2021-25749: <code>runAsNonRoot</code> logic bypass for Windows containers](#cve-2021-25749-runasnonroot-logic-bypass-for-windows-containers) - [Am I vulnerable?](#am-i-vulnerable) - [Affected Versions](#affected-versions) - [How do I mitigate this vulnerability?](#how-do-i-mitigate-this-vulnerability) - [Fixed Versions](#fixed-versions) - [Detection](#detection)
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Dec 13 12:43:45 UTC 2022 - 454.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.23.md
This issue has been rated low and assigned CVE-2021-25749 **Am I vulnerable?** All Kubernetes clusters with following versions, running Windows workloads with `runAsNonRoot` are impacted **Affected Versions**: - kubelet v1.20 - v1.21 - kubelet v1.22.0 - v1.22.13
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Feb 28 21:06:52 UTC 2023 - 424.5K bytes - Viewed (0)