Searched refs:exploit (Results 1 – 25 of 85) sorted by relevance
1234
| /external/libcap/tests/ |
| D | Makefile | 99 run_exploit_test: exploit noexploit 100 @echo exploit should succeed 101 sudo ./exploit ; if [ $$? -ne 0 ]; then exit 0; else exit 1 ; fi 102 @echo exploit should fail 105 exploit.o: exploit.c 108 exploit: exploit.o $(DEPS) target 113 noexploit: exploit.o $(DEPS) 123 rm -f exploit noexploit exploit.o
|
| D | .gitignore | 6 exploit
|
| /external/perfetto/docs/design-docs/ |
| D | security-model.md | 13 exploit the tracing service. We do so at the 22 the tracing service should have no meaningful capabilities to exploit. 34 Consumers are always trusted. They still shouldn't be able to crash or exploit
|
| /external/angle/third_party/vulkan-deps/spirv-tools/src/ |
| D | SECURITY.md | 9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
| /external/angle/third_party/vulkan-deps/spirv-headers/src/ |
| D | SECURITY.md | 9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
| /external/arm-trusted-firmware/docs/security_advisories/ |
| D | security-advisory-tfv-7.rst | 31 At the time of writing, the TF-A project is not aware of a Variant 4 exploit 33 exploit against current standard configurations of TF-A, due to the limited
|
| D | security-advisory-tfv-3.rst | 53 Note that one or more separate vulnerabilities are also required to exploit this
|
| /external/tensorflow/tensorflow/security/advisory/ |
| D | tfsa-2021-095.md | 8 exploit an undefined behavior if input arguments are empty:
|
| D | tfsa-2021-097.md | 7 Incomplete validation in `SparseAdd` results in allowing attackers to exploit
|
| D | tfsa-2021-096.md | 7 Incomplete validation in `SparseAdd` results in allowing attackers to exploit
|
| /external/llvm/test/Transforms/PlaceSafepoints/ |
| D | basic.ll | 27 ; This statepoint is technically not required, but we don't exploit that yet.
|
| /external/llvm/test/Transforms/LowerSwitch/ |
| D | fold-popular-case-to-unreachable-default.ll | 35 ; Cases 6 and INT64_MAX become the new default, but we still exploit the fact
|
| /external/llvm/test/CodeGen/X86/ |
| D | implicit-null-check-negative.ll | 78 ; get fancy here and exploit the commutativity of addition, but right
|
| /external/libcap/doc/ |
| D | capability.notes | 43 for a potential attacker to exploit a hole in a daemon of this
|
| /external/curl/docs/ |
| D | SECURITY-PROCESS.md | 151 effects a possible exploit or trigger of the issue can lead do, including 156 This is a security problem that is truly hard or unlikely to exploit or 163 This is a security problem that is less hard than **Low** to exploit or
|
| /external/gwp_asan/gwp_asan/ |
| D | options.inc | 76 // setuid ASan log_path exploits: https://www.exploit-db.com/exploits/46241.
|
| /external/llvm/test/Transforms/GVN/ |
| D | invariant-load.ll | 78 store i32 5, i32* %p ;; must alias store, want to exploit
|
| /external/eigen/doc/ |
| D | TopicMultithreading.dox | 7 Some %Eigen's algorithms can exploit the multiple cores present in your hardware.
|
| /external/llvm/lib/Target/SystemZ/ |
| D | README.txt | 48 operations. The TRANSLATE ones are probably more difficult to exploit.
|
| /external/python/cryptography/docs/ |
| D | security.rst | 25 specific exploit, merely a reasonable threat model under which ``cryptography``
|
| /external/arm-trusted-firmware/docs/threat_model/ |
| D | threat_model.rst | 172 | | | and how to exploit it | 178 | | line of business if | exploit by an attacker | 183 | | exploited. | exploit the threat | 426 | | attacker to develop a working exploit if left |
|
| /external/swiftshader/third_party/llvm-10.0/llvm/lib/Target/SystemZ/ |
| D | README.txt | 48 operations. The TRANSLATE ones are probably more difficult to exploit.
|
| /external/llvm/test/Transforms/EarlyCSE/ |
| D | edge.ll | 3 ; implementation. EarlyCSE currently doesn't exploit equality comparisons
|
| /external/python/cpython2/Objects/ |
| D | listsort.txt | 139 *sort: There's no structure in random data to exploit, so the theoretical 167 strategies find more to exploit; in a database supplied by Kevin Altis, a 264 allows the adaptive gimmicks more opportunity to exploit shorter natural 304 In order to exploit regularities in the data, we're merging on natural 324 long as possible in order to exploit patterns that may come up later, but we 325 like even more to do merging as soon as possible to exploit that the run just
|
| /external/python/cpython3/Objects/ |
| D | listsort.txt | 139 *sort: There's no structure in random data to exploit, so the theoretical 167 strategies find more to exploit; in a database supplied by Kevin Altis, a 264 allows the adaptive gimmicks more opportunity to exploit shorter natural 304 In order to exploit regularities in the data, we're merging on natural 324 in order to exploit patterns that may come up later, but we like even more to 325 do merging as soon as possible to exploit that the run just found is still
|
1234