- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 10 for vulnerable (0.08 sec)
-
android/guava/src/com/google/common/io/InsecureRecursiveDeleteException.java
import javax.annotation.CheckForNull; /** * Exception indicating that a recursive delete can't be performed because the file system does not * have the support necessary to guarantee that it is not vulnerable to race conditions that would * allow it to delete files and directories outside of the directory being deleted (i.e., {@link * SecureDirectoryStream} is not supported). *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Oct 31 16:07:00 UTC 2024 - 1.9K bytes - Viewed (0) -
build-logic-commons/build-platform/build.gradle.kts
Registered: Wed Nov 06 11:36:14 UTC 2024 - Last Modified: Tue Oct 29 21:53:00 UTC 2024 - 4.8K bytes - Viewed (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HandshakeCertificates.kt
Collections.addAll(trustedCertificates, *platformTrustManager.acceptedIssuers) } /** * Configures this to not authenticate the HTTPS server on to [hostname]. This makes the user * vulnerable to man-in-the-middle attacks and should only be used only in private development * environments and only to carry test data. * * The server’s TLS certificate **does not need to be signed** by a trusted certificate
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 8.5K bytes - Viewed (0) -
compat/maven-plugin-api/src/main/java/org/apache/maven/plugin/descriptor/PluginDescriptor.java
if (getMojos() == null) { return null; // no mojo in this POM } // TODO could we use a map? Maybe if the parent did that for components too, as this is too vulnerable to // changes above not being propagated to the map for (MojoDescriptor desc : getMojos()) { if (goal.equals(desc.getGoal())) { return desc; } }
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 16.2K bytes - Viewed (0) -
common-protos/k8s.io/apimachinery/pkg/apis/meta/v1/generated.proto
// component responsible for a finalizer later in the list, resulting in a deadlock. // Without enforced ordering finalizers are free to order amongst themselves and // are not vulnerable to ordering changes in the list. // +optional // +patchStrategy=merge repeated string finalizers = 14; // ManagedFields maps workflow-id and version to the set of fields
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 53.3K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.3.md
* Fix strategic merge diff list diff bug ([#26418](https://github.com/kubernetes/kubernetes/pull/26418), [@AdoHe](https://github.com/AdoHe)) * Setting TLS1.2 minimum because TLS1.0 and TLS1.1 are vulnerable ([#26169](https://github.com/kubernetes/kubernetes/pull/26169), [@victorgp](https://github.com/victorgp))
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu Dec 24 02:28:26 UTC 2020 - 84K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.24.md
- [CVE-2021-25749: <code>runAsNonRoot</code> logic bypass for Windows containers](#cve-2021-25749-runasnonroot-logic-bypass-for-windows-containers) - [Am I vulnerable?](#am-i-vulnerable) - [Affected Versions](#affected-versions) - [How do I mitigate this vulnerability?](#how-do-i-mitigate-this-vulnerability) - [Fixed Versions](#fixed-versions) - [Detection](#detection)
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu Aug 24 00:02:43 UTC 2023 - 473.4K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.22.md
- [CVE-2021-25749: <code>runAsNonRoot</code> logic bypass for Windows containers](#cve-2021-25749-runasnonroot-logic-bypass-for-windows-containers) - [Am I vulnerable?](#am-i-vulnerable) - [Affected Versions](#affected-versions) - [How do I mitigate this vulnerability?](#how-do-i-mitigate-this-vulnerability) - [Fixed Versions](#fixed-versions) - [Detection](#detection)
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Dec 13 12:43:45 UTC 2022 - 454.1K bytes - Viewed (0) -
common-protos/k8s.io/api/core/v1/generated.proto
// kubelet. If the kubelet is configured to verify the apiserver's TLS credentials, it does not mean the // connection to the real kubelet is vulnerable to a man in the middle attack (e.g. an attacker could not intercept // the actual log data coming from the real kubelet). // +optional optional bool insecureSkipTLSVerifyBackend = 9; }
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 255.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.23.md
This issue has been rated low and assigned CVE-2021-25749 **Am I vulnerable?** All Kubernetes clusters with following versions, running Windows workloads with `runAsNonRoot` are impacted **Affected Versions**: - kubelet v1.20 - v1.21 - kubelet v1.22.0 - v1.22.13
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Tue Feb 28 21:06:52 UTC 2023 - 424.5K bytes - Viewed (0)