Home
last modified time | relevance | path

Searched refs:exploit (Results 1 – 25 of 209) sorted by relevance

123456789

/aosp_15_r20/external/libcap/tests/
H A DMakefile100 run_exploit_test: exploit noexploit
101 @echo exploit should succeed
102 $(SUDO) ./exploit ; if [ $$? -ne 0 ]; then exit 0; else exit 1 ; fi
103 @echo exploit should fail
106 exploit: exploit.o $(DEPS) target
111 noexploit: exploit.o $(DEPS)
121 rm -f exploit noexploit exploit.o
H A D.gitignore6 exploit
/aosp_15_r20/external/libcap/contrib/capso/
H A Dcapso.c40 const char *exploit = getenv("TRIGGER_EXPLOIT"); in fake_exploit() local
41 if (exploit == NULL) { in fake_exploit()
45 switch (*exploit) { in fake_exploit()
48 exploit++; in fake_exploit()
56 if (*(exploit-1) == '%') { in fake_exploit()
67 char *ts = strdup(exploit); in fake_exploit()
/aosp_15_r20/external/perfetto/docs/design-docs/
H A Dsecurity-model.md13 exploit the tracing service. We do so at the
22 the tracing service should have no meaningful capabilities to exploit.
34 Consumers are always trusted. They still shouldn't be able to crash or exploit
/aosp_15_r20/prebuilts/go/linux-x86/src/cmd/go/testdata/script/
Dmod_toolchain_slash.txt14 module exploit
27 module exploit
/aosp_15_r20/external/cronet/third_party/rust/chromium_crates_io/vendor/strsim-0.11.1/
H A DSECURITY.md16 * Proof-of-concept or exploit code (if possible)
17 * Impact of the issue, including how an attacker might exploit the issue
/aosp_15_r20/external/rust/android-crates-io/crates/strsim/
DSECURITY.md16 * Proof-of-concept or exploit code (if possible)
17 * Impact of the issue, including how an attacker might exploit the issue
/aosp_15_r20/cts/hostsidetests/securitybulletin/test-apps/launchanywhere/src/com/android/security/cts/launchanywhere/
H A DAuthenticator.java34 static public IGenerateMalformedParcel exploit; field in Authenticator
73 data = exploit.generate(payload);
H A DStartExploit.java39 Authenticator.exploit = in onCreate()
/aosp_15_r20/external/arm-trusted-firmware/docs/security_advisories/
H A Dsecurity-advisory-tfv-7.rst31 At the time of writing, the TF-A project is not aware of a Variant 4 exploit
33 exploit against current standard configurations of TF-A, due to the limited
/aosp_15_r20/external/trusty/arm-trusted-firmware/docs/security_advisories/
Dsecurity-advisory-tfv-7.rst31 At the time of writing, the TF-A project is not aware of a Variant 4 exploit
33 exploit against current standard configurations of TF-A, due to the limited
/aosp_15_r20/external/rust/android-crates-io/crates/bitflags/
DSECURITY.md9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/aosp_15_r20/prebuilts/go/linux-x86/src/cmd/vendor/github.com/ianlancetaylor/demangle/
DSECURITY.md9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/aosp_15_r20/external/cronet/third_party/rust/chromium_crates_io/vendor/bitflags-2.5.0/
H A DSECURITY.md9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/aosp_15_r20/external/deqp-deps/SPIRV-Headers/
DSECURITY.md9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/aosp_15_r20/external/swiftshader/third_party/SPIRV-Headers/
H A DSECURITY.md9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/aosp_15_r20/external/angle/third_party/spirv-headers/src/
H A DSECURITY.md9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/aosp_15_r20/external/angle/third_party/spirv-tools/src/
H A DSECURITY.md9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/aosp_15_r20/external/swiftshader/third_party/SPIRV-Tools/
H A DSECURITY.md9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/aosp_15_r20/external/cronet/third_party/rust/chromium_crates_io/vendor/getrandom-0.2.14/
H A DSECURITY.md9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/aosp_15_r20/external/expat/
H A DSECURITY.md3 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/aosp_15_r20/external/deqp-deps/SPIRV-Tools/
DSECURITY.md9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/aosp_15_r20/external/rust/android-crates-io/crates/getrandom/
DSECURITY.md9 …ou to fix the issue before public exposure, reducing the chance that the exploit will be used befo…
/aosp_15_r20/external/google-cloud-java/java-securitycenter/proto-google-cloud-securitycenter-v1/src/main/proto/google/cloud/securitycenter/v1/
H A Dvulnerability.proto89 // must exist in order to exploit the vulnerability.
188 // must exist in order to exploit the vulnerability.
/aosp_15_r20/external/lz4/
H A DSECURITY.md5 to fix the issue before public exposure, reducing the chance that the exploit will be

123456789