/aosp_15_r20/external/libcap/tests/ |
H A D | Makefile | 100 run_exploit_test: exploit noexploit 101 @echo exploit should succeed 102 $(SUDO) ./exploit ; if [ $$? -ne 0 ]; then exit 0; else exit 1 ; fi 103 @echo exploit should fail 106 exploit: exploit.o $(DEPS) target 111 noexploit: exploit.o $(DEPS) 121 rm -f exploit noexploit exploit.o
|
H A D | .gitignore | 6 exploit
|
/aosp_15_r20/external/libcap/contrib/capso/ |
H A D | capso.c | 40 const char *exploit = getenv("TRIGGER_EXPLOIT"); in fake_exploit() local 41 if (exploit == NULL) { in fake_exploit() 45 switch (*exploit) { in fake_exploit() 48 exploit++; in fake_exploit() 56 if (*(exploit-1) == '%') { in fake_exploit() 67 char *ts = strdup(exploit); in fake_exploit()
|
/aosp_15_r20/external/perfetto/docs/design-docs/ |
H A D | security-model.md | 13 exploit the tracing service. We do so at the 22 the tracing service should have no meaningful capabilities to exploit. 34 Consumers are always trusted. They still shouldn't be able to crash or exploit
|
/aosp_15_r20/prebuilts/go/linux-x86/src/cmd/go/testdata/script/ |
D | mod_toolchain_slash.txt | 14 module exploit 27 module exploit
|
/aosp_15_r20/external/cronet/third_party/rust/chromium_crates_io/vendor/strsim-0.11.1/ |
H A D | SECURITY.md | 16 * Proof-of-concept or exploit code (if possible) 17 * Impact of the issue, including how an attacker might exploit the issue
|
/aosp_15_r20/external/rust/android-crates-io/crates/strsim/ |
D | SECURITY.md | 16 * Proof-of-concept or exploit code (if possible) 17 * Impact of the issue, including how an attacker might exploit the issue
|
/aosp_15_r20/cts/hostsidetests/securitybulletin/test-apps/launchanywhere/src/com/android/security/cts/launchanywhere/ |
H A D | Authenticator.java | 34 static public IGenerateMalformedParcel exploit; field in Authenticator 73 data = exploit.generate(payload);
|
H A D | StartExploit.java | 39 Authenticator.exploit = in onCreate()
|
/aosp_15_r20/external/arm-trusted-firmware/docs/security_advisories/ |
H A D | security-advisory-tfv-7.rst | 31 At the time of writing, the TF-A project is not aware of a Variant 4 exploit 33 exploit against current standard configurations of TF-A, due to the limited
|
/aosp_15_r20/external/trusty/arm-trusted-firmware/docs/security_advisories/ |
D | security-advisory-tfv-7.rst | 31 At the time of writing, the TF-A project is not aware of a Variant 4 exploit 33 exploit against current standard configurations of TF-A, due to the limited
|
/aosp_15_r20/external/rust/android-crates-io/crates/bitflags/ |
D | SECURITY.md | 9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
/aosp_15_r20/prebuilts/go/linux-x86/src/cmd/vendor/github.com/ianlancetaylor/demangle/ |
D | SECURITY.md | 9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
/aosp_15_r20/external/cronet/third_party/rust/chromium_crates_io/vendor/bitflags-2.5.0/ |
H A D | SECURITY.md | 9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
/aosp_15_r20/external/deqp-deps/SPIRV-Headers/ |
D | SECURITY.md | 9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
/aosp_15_r20/external/swiftshader/third_party/SPIRV-Headers/ |
H A D | SECURITY.md | 9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
/aosp_15_r20/external/angle/third_party/spirv-headers/src/ |
H A D | SECURITY.md | 9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
/aosp_15_r20/external/angle/third_party/spirv-tools/src/ |
H A D | SECURITY.md | 9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
/aosp_15_r20/external/swiftshader/third_party/SPIRV-Tools/ |
H A D | SECURITY.md | 9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
/aosp_15_r20/external/cronet/third_party/rust/chromium_crates_io/vendor/getrandom-0.2.14/ |
H A D | SECURITY.md | 9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
/aosp_15_r20/external/expat/ |
H A D | SECURITY.md | 3 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
/aosp_15_r20/external/deqp-deps/SPIRV-Tools/ |
D | SECURITY.md | 9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
/aosp_15_r20/external/rust/android-crates-io/crates/getrandom/ |
D | SECURITY.md | 9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
|
/aosp_15_r20/external/google-cloud-java/java-securitycenter/proto-google-cloud-securitycenter-v1/src/main/proto/google/cloud/securitycenter/v1/ |
H A D | vulnerability.proto | 89 // must exist in order to exploit the vulnerability. 188 // must exist in order to exploit the vulnerability.
|
/aosp_15_r20/external/lz4/ |
H A D | SECURITY.md | 5 to fix the issue before public exposure, reducing the chance that the exploit will be
|