Searched refs:exploit (Results 1 – 25 of 156) sorted by relevance
1234567
/external/libcap/tests/ |
D | Makefile | 100 run_exploit_test: exploit noexploit 101 @echo exploit should succeed 102 $(SUDO) ./exploit ; if [ $$? -ne 0 ]; then exit 0; else exit 1 ; fi 103 @echo exploit should fail 106 exploit: exploit.o $(DEPS) target 111 noexploit: exploit.o $(DEPS) 121 rm -f exploit noexploit exploit.o
|
D | .gitignore | 6 exploit
|
/external/libcap/contrib/capso/ |
D | capso.c | 40 const char *exploit = getenv("TRIGGER_EXPLOIT"); in fake_exploit() local 41 if (exploit == NULL) { in fake_exploit() 45 switch (*exploit) { in fake_exploit() 48 exploit++; in fake_exploit() 56 if (*(exploit-1) == '%') { in fake_exploit() 67 char *ts = strdup(exploit); in fake_exploit()
|
/external/cronet/tot/third_party/rust/chromium_crates_io/vendor/strsim-0.11.1/ |
D | SECURITY.md | 16 * Proof-of-concept or exploit code (if possible) 17 * Impact of the issue, including how an attacker might exploit the issue
|
/external/rust/android-crates-io/crates/strsim/ |
D | SECURITY.md | 16 * Proof-of-concept or exploit code (if possible) 17 * Impact of the issue, including how an attacker might exploit the issue
|
/external/cronet/stable/third_party/rust/chromium_crates_io/vendor/strsim-0.11.1/ |
D | SECURITY.md | 16 * Proof-of-concept or exploit code (if possible) 17 * Impact of the issue, including how an attacker might exploit the issue
|
/external/perfetto/docs/design-docs/ |
D | security-model.md | 13 exploit the tracing service. We do so at the 22 the tracing service should have no meaningful capabilities to exploit. 34 Consumers are always trusted. They still shouldn't be able to crash or exploit
|
/external/cronet/tot/third_party/rust/chromium_crates_io/vendor/bitflags-2.6.0/ |
D | SECURITY.md | 9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
/external/rust/android-crates-io/crates/bitflags/ |
D | SECURITY.md | 9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
/external/cronet/stable/third_party/rust/chromium_crates_io/vendor/bitflags-2.6.0/ |
D | SECURITY.md | 9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
/external/cronet/stable/third_party/rust/chromium_crates_io/vendor/getrandom-0.2.15/ |
D | SECURITY.md | 9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
/external/swiftshader/third_party/SPIRV-Headers/ |
D | SECURITY.md | 9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
/external/expat/ |
D | SECURITY.md | 3 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
/external/angle/third_party/spirv-headers/src/ |
D | SECURITY.md | 9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
/external/deqp-deps/SPIRV-Headers/ |
D | SECURITY.md | 9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
/external/cronet/tot/third_party/rust/chromium_crates_io/vendor/getrandom-0.2.15/ |
D | SECURITY.md | 9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
/external/angle/third_party/spirv-tools/src/ |
D | SECURITY.md | 9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
/external/swiftshader/third_party/SPIRV-Tools/ |
D | SECURITY.md | 9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
/external/deqp-deps/SPIRV-Tools/ |
D | SECURITY.md | 9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
/external/rust/android-crates-io/crates/getrandom/ |
D | SECURITY.md | 9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
/external/lz4/ |
D | SECURITY.md | 5 to fix the issue before public exposure, reducing the chance that the exploit will be
|
/external/fonttools/ |
D | SECURITY.md | 5 to fix the issue before public exposure, reducing the chance that the exploit will be
|
/external/libfuse/ |
D | SECURITY.md | 5 to fix the issue before public exposure, reducing the chance that the exploit will be
|
/external/harfbuzz_ng/ |
D | SECURITY.md | 5 to fix the issue before public exposure, reducing the chance that the exploit will be
|
/external/arm-trusted-firmware/docs/security_advisories/ |
D | security-advisory-tfv-7.rst | 31 At the time of writing, the TF-A project is not aware of a Variant 4 exploit 33 exploit against current standard configurations of TF-A, due to the limited
|
1234567