Searched refs:vulnerable (Results 1 – 25 of 41) sorted by relevance
12
/external/replicaisland/src/com/replica/replicaisland/ |
D | LifetimeComponent.java | 180 public final void setVulnerableToDeathTiles(boolean vulnerable) { in setVulnerableToDeathTiles() argument 181 mVulnerableToDeathTiles = vulnerable; in setVulnerableToDeathTiles()
|
/external/python/rsa/doc/ |
D | reference.rst | 60 Python-RSA 3.4, and was removed in version 4.0. It's vulnerable to a
|
D | usage.rst | 271 Python-RSA 3.4, and has been removed in version 4.0. It's vulnerable to a
|
/external/wycheproof/ |
D | README.md | 39 library is secure, it just means that it is not vulnerable to the attacks that 62 The tests detect whether a library is vulnerable to many attacks, including
|
/external/caliper/caliper/src/main/resources/com/google/caliper/config/ |
D | global-config.properties | 49 # Higher values take longer, but are more precise (less vulnerable to fixed costs)
|
/external/openssh/ |
D | ssh-keyscan.0 | 62 verifying the keys, users will be vulnerable to man in the middle
|
/external/python/cpython2/Doc/library/ |
D | xml.rst | 57 modules are vulnerable to them.
|
D | subprocess.rst | 246 untrusted source makes a program vulnerable to `shell injection
|
D | sqlite3.rst | 57 is insecure; it makes your program vulnerable to an SQL injection attack
|
/external/python/cpython3/Doc/library/ |
D | xml.rst | 61 the various modules are vulnerable to them.
|
/external/curl/docs/ |
D | BUGS | 60 vulnerable if the bug becomes public knowledge, then please report that bug 66 have on existing users out there who might be using the vulnerable versions.
|
/external/protobuf/objectivec/ |
D | GPBRootObject.m | 99 // pointed out that they are vulnerable to live locking on iOS in cases of
|
/external/python/cpython3/Misc/NEWS.d/ |
D | 3.7.0b3.rst | 27 Regexes in difflib and poplib were vulnerable to catastrophic backtracking.
|
D | 3.6.5rc1.rst | 16 Regexes in difflib and poplib were vulnerable to catastrophic backtracking.
|
D | 3.5.1rc1.rst | 807 Disable the vulnerable SSLv3 protocol by default when creating
|
/external/swiftshader/third_party/llvm-7.0/llvm/docs/ |
D | SpeculativeLoadHardening.md | 137 static source code annotations or code vulnerable to a variant #1 style 186 These code patterns are also vulnerable to Spectre variant #2, and as such are 987 vulnerable. For x86 systems this is done by either injecting an `lfence` 1000 human judgement to evaluate whether code might be vulnerable. Especially for
|
/external/scapy/test/ |
D | sslv2.uts | 9 ################# Reading SSLv2 vulnerable test session ####################### 19 + Read a vulnerable SSLv2 session
|
D | tls.uts | 980 ################## Reading TLS vulnerable test session ######################## 987 + Read a vulnerable TLS session 989 = Reading TLS vulnerable session - Decrypt data from using a compromised server key
|
/external/python/cpython2/Misc/NEWS.d/ |
D | 2.7.15rc1.rst | 7 A regex in fpformat was vulnerable to catastrophic backtracking. This regex 19 Regexes in difflib and poplib were vulnerable to catastrophic backtracking.
|
D | 2.7.11rc1.rst | 180 Disable the vulnerable SSLv3 protocol by default when creating
|
D | 2.7.1rc1.rst | 695 smtpd.py is vulnerable to DoS attacks deriving from missing error handling
|
/external/dnsmasq/ |
D | CHANGELOG | 411 clear if dnsmasq is vulnerable, since to doesn't implement
|
/external/libogg/doc/ |
D | rfc5334.txt | 294 rigid definition. This format in itself is not more vulnerable than
|
/external/python/cpython3/Doc/howto/ |
D | unicode.rst | 670 strings, you will find your program vulnerable to bugs wherever you combine the
|
/external/python/cpython2/Doc/howto/ |
D | unicode.rst | 647 strings, you will find your program vulnerable to bugs wherever you combine the
|
12