/third_party/ltp/runtest/ |
D | cve | 2 cve-2011-0999 thp01 -I 120 3 cve-2011-2183 ksm05 -I 10 4 cve-2011-2496 vma03 5 cve-2012-0957 uname04 6 cve-2014-0196 cve-2014-0196 7 cve-2015-0235 gethostbyname_r01 8 cve-2015-7550 keyctl02 9 cve-2016-4470 keyctl01.sh 10 cve-2015-3290 cve-2015-3290 11 cve-2016-4997 setsockopt03 [all …]
|
/third_party/ltp/testcases/cve/ |
D | .gitignore | 1 cve-2014-0196 2 cve-2015-3290 3 cve-2016-7042 4 cve-2016-7117 5 cve-2016-10044 6 cve-2017-2618 7 cve-2017-2671 10 cve-2017-17052 11 cve-2017-16939 12 cve-2017-17053
|
D | Makefile | 12 cve-2016-7042: LDLIBS += $(KEYUTILS_LIBS) 14 cve-2014-0196 cve-2016-7117 cve-2017-2671 cve-2017-17052 cve-2017-17053: CFLAGS += -pthread 15 cve-2014-0196 cve-2016-7117 cve-2017-2671: LDLIBS += -lrt 18 cve-2014-0196: LDLIBS += -lutil 25 cve-2015-3290: CFLAGS += -pthread -fomit-frame-pointer
|
/third_party/node/src/ |
D | node_revert.h | 39 inline const char* RevertMessage(const reversion cve) { in RevertMessage() argument 41 switch (cve) { in RevertMessage() 53 inline void Revert(const reversion cve) { in Revert() argument 54 per_process::reverted_cve |= 1 << cve; in Revert() 55 printf("SECURITY WARNING: Reverting %s\n", RevertMessage(cve)); in Revert() 58 inline void Revert(const char* cve, std::string* error) { in Revert() argument 60 if (strcmp(cve, label) == 0) return Revert(SECURITY_REVERT_##code); in Revert() 64 *error += cve; in Revert() 68 inline bool IsReverted(const reversion cve) { in IsReverted() argument 69 return per_process::reverted_cve & (1 << cve); in IsReverted() [all …]
|
D | node.cc | 777 for (const std::string& cve : per_process::cli_options->security_reverts) { in ProcessGlobalArgs() local 778 Revert(cve.c_str(), &revert_error); in ProcessGlobalArgs()
|
/third_party/chromium/patch/ |
D | README.md | 8 | 0001-cve.patch | 针对Chromium CVE漏洞的修复 |
|
/third_party/ltp/scenario_groups/ |
D | default | 29 cve
|
/third_party/mindspore/ |
D | RELEASE.md | 2582 …cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11656), [CVE-2020-13871](https://cve.mitre.org/cgi… 2583 …- Libjpeg-turbo : Update libjpeg-turbo to 2.0.4 to handle [CVE-2020-13790](https://cve.mitre.org/c… 2699 …cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11656), [CVE-2020-13871](https://cve.mitre.org/cgi… 2700 …- Libjpeg-turbo : Update libjpeg-turbo to 2.0.4 to handle [CVE-2020-13790](https://cve.mitre.org/c… 2778 …cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11656), [CVE-2020-13871](https://cve.mitre.org/cgi… 2779 …- Libjpeg-turbo : Update libjpeg-turbo to 2.0.4 to handle [CVE-2020-13790](https://cve.mitre.org/c… 2881 …cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11656), [CVE-2020-13871](https://cve.mitre.org/cgi…
|
/third_party/flutter/skia/third_party/externals/icu/source/data/misc/ |
D | keyTypeData.txt | 242 cve{""}
|
/third_party/skia/third_party/externals/icu/source/data/misc/ |
D | keyTypeData.txt | 245 cve{""}
|
/third_party/icu/icu4c/source/data/misc/ |
D | keyTypeData.txt | 245 cve{""}
|
/third_party/curl/docs/ |
D | SECURITY-PROCESS.md | 63 [HackerOne](https://docs.hackerone.com/programs/cve-requests.html)
|
/third_party/ltp/doc/ |
D | c-test-tutorial-simple.txt | 970 cve-2016-7117: LDFLAGS += -lpthread 972 cve-2014-0196: LDFLAGS += -lpthread -lutil -lrt 973 cve-2016-7117: LDFLAGS += -lpthread -lrt
|
/third_party/gptfdisk/ |
D | NEWS | 86 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0256 90 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0308
|
/third_party/skia/third_party/externals/expat/expat/ |
D | Changes | 576 Details: https://libexpat.github.io/doc/cve-2017-9233/
|
/third_party/node/doc/changelogs/ |
D | CHANGELOG_V012.md | 126 …rability discovered in V8, more details can be found in the CVE at https://cve.mitre.org/cgi-bin/c…
|
D | CHANGELOG_V14.md | 88 * **[CVE-2022-32212](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212)**: DNS rebindin… 89 * **[CVE-2022-32213](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32213)**: bypass via o… 90 * **[CVE-2022-35256](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35256)**: HTTP Request… 280 More details will be available at [CVE-2021-44531](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C… 288 More details will be available at [CVE-2021-44532](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C… 296 More details will be available at [CVE-2021-44533](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C… 304 More details will be available at [CVE-2022-21824](https://cve.mitre.org/cgi-bin/cvename.cgi?name=C… 312 * \[[`9f2c52617f`](https://github.com/nodejs/node/commit/9f2c52617f)] - **src**: add cve reverts an… 354 …muggling (HRS). More details will be available at [CVE-2021-22959](https://cve.mitre.org/cgi-bin/c… 356 …ain conditions. More details will be available at [CVE-2021-22960](https://cve.mitre.org/cgi-bin/c… [all …]
|
D | CHANGELOG_V010.md | 142 …rability discovered in V8, more details can be found in the CVE at https://cve.mitre.org/cgi-bin/c…
|
/third_party/expat/ |
D | Changes | 591 Details: https://libexpat.github.io/doc/cve-2017-9233/
|
/third_party/freetype/docs/ |
D | CHANGES | 8 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999 293 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942 571 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105 572 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287 648 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10328
|
/third_party/skia/third_party/externals/freetype/docs/ |
D | CHANGES | 158 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15999 443 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942 721 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105 722 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287 798 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10328
|
/third_party/ffmpeg/doc/ |
D | developer.texi | 806 number} issued by @url{http://cve.mitre.org/}.
|
/third_party/flutter/skia/third_party/externals/freetype/docs/ |
D | CHANGES | 192 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6942 470 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8105 471 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8287 547 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10328
|
/third_party/skia/third_party/externals/swiftshader/third_party/llvm-10.0/llvm/lib/Bitcode/Reader/ |
D | BitcodeReader.cpp | 4415 cve = CaseVals.end(); cvi != cve; ++cvi) in parseFunctionBody() local
|
/third_party/python/Doc/c-api/ |
D | init.rst | 624 See `CVE-2008-5983 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5983>`_.
|