Home
last modified time | relevance | path

Searched refs:exploit (Results 1 – 25 of 85) sorted by relevance

1234

/external/libcap/tests/
DMakefile99 run_exploit_test: exploit noexploit
100 @echo exploit should succeed
101 sudo ./exploit ; if [ $$? -ne 0 ]; then exit 0; else exit 1 ; fi
102 @echo exploit should fail
105 exploit.o: exploit.c
108 exploit: exploit.o $(DEPS) target
113 noexploit: exploit.o $(DEPS)
123 rm -f exploit noexploit exploit.o
D.gitignore6 exploit
/external/perfetto/docs/design-docs/
Dsecurity-model.md13 exploit the tracing service. We do so at the
22 the tracing service should have no meaningful capabilities to exploit.
34 Consumers are always trusted. They still shouldn't be able to crash or exploit
/external/angle/third_party/vulkan-deps/spirv-tools/src/
DSECURITY.md9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/external/angle/third_party/vulkan-deps/spirv-headers/src/
DSECURITY.md9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/external/arm-trusted-firmware/docs/security_advisories/
Dsecurity-advisory-tfv-7.rst31 At the time of writing, the TF-A project is not aware of a Variant 4 exploit
33 exploit against current standard configurations of TF-A, due to the limited
Dsecurity-advisory-tfv-3.rst53 Note that one or more separate vulnerabilities are also required to exploit this
/external/tensorflow/tensorflow/security/advisory/
Dtfsa-2021-095.md8 exploit an undefined behavior if input arguments are empty:
Dtfsa-2021-097.md7 Incomplete validation in `SparseAdd` results in allowing attackers to exploit
Dtfsa-2021-096.md7 Incomplete validation in `SparseAdd` results in allowing attackers to exploit
/external/llvm/test/Transforms/PlaceSafepoints/
Dbasic.ll27 ; This statepoint is technically not required, but we don't exploit that yet.
/external/llvm/test/Transforms/LowerSwitch/
Dfold-popular-case-to-unreachable-default.ll35 ; Cases 6 and INT64_MAX become the new default, but we still exploit the fact
/external/llvm/test/CodeGen/X86/
Dimplicit-null-check-negative.ll78 ; get fancy here and exploit the commutativity of addition, but right
/external/libcap/doc/
Dcapability.notes43 for a potential attacker to exploit a hole in a daemon of this
/external/curl/docs/
DSECURITY-PROCESS.md151 effects a possible exploit or trigger of the issue can lead do, including
156 This is a security problem that is truly hard or unlikely to exploit or
163 This is a security problem that is less hard than **Low** to exploit or
/external/gwp_asan/gwp_asan/
Doptions.inc76 // setuid ASan log_path exploits: https://www.exploit-db.com/exploits/46241.
/external/llvm/test/Transforms/GVN/
Dinvariant-load.ll78 store i32 5, i32* %p ;; must alias store, want to exploit
/external/eigen/doc/
DTopicMultithreading.dox7 Some %Eigen's algorithms can exploit the multiple cores present in your hardware.
/external/llvm/lib/Target/SystemZ/
DREADME.txt48 operations. The TRANSLATE ones are probably more difficult to exploit.
/external/python/cryptography/docs/
Dsecurity.rst25 specific exploit, merely a reasonable threat model under which ``cryptography``
/external/arm-trusted-firmware/docs/threat_model/
Dthreat_model.rst172 | | | and how to exploit it |
178 | | line of business if | exploit by an attacker |
183 | | exploited. | exploit the threat |
426 | | attacker to develop a working exploit if left |
/external/swiftshader/third_party/llvm-10.0/llvm/lib/Target/SystemZ/
DREADME.txt48 operations. The TRANSLATE ones are probably more difficult to exploit.
/external/llvm/test/Transforms/EarlyCSE/
Dedge.ll3 ; implementation. EarlyCSE currently doesn't exploit equality comparisons
/external/python/cpython2/Objects/
Dlistsort.txt139 *sort: There's no structure in random data to exploit, so the theoretical
167 strategies find more to exploit; in a database supplied by Kevin Altis, a
264 allows the adaptive gimmicks more opportunity to exploit shorter natural
304 In order to exploit regularities in the data, we're merging on natural
324 long as possible in order to exploit patterns that may come up later, but we
325 like even more to do merging as soon as possible to exploit that the run just
/external/python/cpython3/Objects/
Dlistsort.txt139 *sort: There's no structure in random data to exploit, so the theoretical
167 strategies find more to exploit; in a database supplied by Kevin Altis, a
264 allows the adaptive gimmicks more opportunity to exploit shorter natural
304 In order to exploit regularities in the data, we're merging on natural
324 in order to exploit patterns that may come up later, but we like even more to
325 do merging as soon as possible to exploit that the run just found is still

1234