Home
last modified time | relevance | path

Searched refs:exploit (Results 1 – 25 of 156) sorted by relevance

1234567

/external/libcap/tests/
DMakefile100 run_exploit_test: exploit noexploit
101 @echo exploit should succeed
102 $(SUDO) ./exploit ; if [ $$? -ne 0 ]; then exit 0; else exit 1 ; fi
103 @echo exploit should fail
106 exploit: exploit.o $(DEPS) target
111 noexploit: exploit.o $(DEPS)
121 rm -f exploit noexploit exploit.o
D.gitignore6 exploit
/external/libcap/contrib/capso/
Dcapso.c40 const char *exploit = getenv("TRIGGER_EXPLOIT"); in fake_exploit() local
41 if (exploit == NULL) { in fake_exploit()
45 switch (*exploit) { in fake_exploit()
48 exploit++; in fake_exploit()
56 if (*(exploit-1) == '%') { in fake_exploit()
67 char *ts = strdup(exploit); in fake_exploit()
/external/cronet/tot/third_party/rust/chromium_crates_io/vendor/strsim-0.11.1/
DSECURITY.md16 * Proof-of-concept or exploit code (if possible)
17 * Impact of the issue, including how an attacker might exploit the issue
/external/rust/android-crates-io/crates/strsim/
DSECURITY.md16 * Proof-of-concept or exploit code (if possible)
17 * Impact of the issue, including how an attacker might exploit the issue
/external/cronet/stable/third_party/rust/chromium_crates_io/vendor/strsim-0.11.1/
DSECURITY.md16 * Proof-of-concept or exploit code (if possible)
17 * Impact of the issue, including how an attacker might exploit the issue
/external/perfetto/docs/design-docs/
Dsecurity-model.md13 exploit the tracing service. We do so at the
22 the tracing service should have no meaningful capabilities to exploit.
34 Consumers are always trusted. They still shouldn't be able to crash or exploit
/external/cronet/tot/third_party/rust/chromium_crates_io/vendor/bitflags-2.6.0/
DSECURITY.md9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/external/rust/android-crates-io/crates/bitflags/
DSECURITY.md9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/external/cronet/stable/third_party/rust/chromium_crates_io/vendor/bitflags-2.6.0/
DSECURITY.md9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/external/cronet/stable/third_party/rust/chromium_crates_io/vendor/getrandom-0.2.15/
DSECURITY.md9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/external/swiftshader/third_party/SPIRV-Headers/
DSECURITY.md9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/external/expat/
DSECURITY.md3 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/external/angle/third_party/spirv-headers/src/
DSECURITY.md9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/external/deqp-deps/SPIRV-Headers/
DSECURITY.md9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/external/cronet/tot/third_party/rust/chromium_crates_io/vendor/getrandom-0.2.15/
DSECURITY.md9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/external/angle/third_party/spirv-tools/src/
DSECURITY.md9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/external/swiftshader/third_party/SPIRV-Tools/
DSECURITY.md9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/external/deqp-deps/SPIRV-Tools/
DSECURITY.md9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/external/rust/android-crates-io/crates/getrandom/
DSECURITY.md9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/external/lz4/
DSECURITY.md5 to fix the issue before public exposure, reducing the chance that the exploit will be
/external/fonttools/
DSECURITY.md5 to fix the issue before public exposure, reducing the chance that the exploit will be
/external/libfuse/
DSECURITY.md5 to fix the issue before public exposure, reducing the chance that the exploit will be
/external/harfbuzz_ng/
DSECURITY.md5 to fix the issue before public exposure, reducing the chance that the exploit will be
/external/arm-trusted-firmware/docs/security_advisories/
Dsecurity-advisory-tfv-7.rst31 At the time of writing, the TF-A project is not aware of a Variant 4 exploit
33 exploit against current standard configurations of TF-A, due to the limited

1234567