Home
last modified time | relevance | path

Searched refs:CVE (Results 1 – 25 of 371) sorted by relevance

12345678910>>...15

/external/dng_sdk/fuzzer/
DREADME.md8 * CVE-2020-9589
9 * CVE-2020-9590
10 * CVE-2020-9620
11 * CVE-2020-9621
12 * CVE-2020-9622
13 * CVE-2020-9623
14 * CVE-2020-9624
15 * CVE-2020-9625
16 * CVE-2020-9626
17 * CVE-2020-9627
[all …]
/external/rust/crates/libz-sys/src/zlib-ng/test/
DREADME.md6 |[CVE-2003-0107.c](https://nvd.nist.gov/vuln/detail/CVE-2003-0107)|Buffer overflow in the gzprintf …
7 |[CVE-2002-0059](https://nvd.nist.gov/vuln/detail/CVE-2002-0059)|inflateEnd to release memory more …
8 |[CVE-2004-0797](https://nvd.nist.gov/vuln/detail/CVE-2004-0797)|Error handling in inflate and infl…
9 |[CVE-2005-1849](https://nvd.nist.gov/vuln/detail/CVE-2005-1849)|inftrees.h bug causes crash|
10 |[CVE-2005-2096](https://nvd.nist.gov/vuln/detail/CVE-2005-2096)|Buffer overflow when incomplete co…
DMakefile.in80 testCVE-2003-0107: CVE-2003-0107$(EXE) check_cross_dep
81 @if ${QEMU_RUN} ./CVE-2003-0107$(EXE); then \
87 CVE-2003-0107.o: $(SRCDIR)/CVE-2003-0107.c
88 $(CC) $(CFLAGS) -I.. -I$(SRCTOP) -c -o $@ $(SRCDIR)/CVE-2003-0107.c
90 CVE-2003-0107$(EXE): CVE-2003-0107.o
91 $(CC) $(CFLAGS) -o $@ CVE-2003-0107.o $(TEST_LDFLAGS)
109 rm -f CVE-2003-0107$(EXE) switchlevels$(EXE)
DtestCVEinputs.sh15 for CVE in $CVEs; do
17 for testcase in ${TESTDIR}/${CVE}/*.gz; do
26 echo " --- zlib not vulnerable to $CVE ---";
28 echo " --- zlib VULNERABLE to $CVE ---"; exit 1;
/external/python/cpython3/Misc/NEWS.d/
D3.6.2rc2.rst20 vulnerabilities including: CVE-2017-9233 (External entity infinite loop
21 DoS), CVE-2016-9063 (Integer overflow, re-fix), CVE-2016-0718 (Fix
22 regression bugs from 2.2.0's fix to CVE-2016-0718) and CVE-2012-0876
23 (Counter hash flooding with SipHash). Note: the CVE-2016-5300 (Use
/external/arm-trusted-firmware/docs/process/
Dsecurity.rst76 .. |TFV-1| replace:: :ref:`Advisory TFV-1 (CVE-2016-10319)`
77 .. |TFV-2| replace:: :ref:`Advisory TFV-2 (CVE-2017-7564)`
78 .. |TFV-3| replace:: :ref:`Advisory TFV-3 (CVE-2017-7563)`
79 .. |TFV-4| replace:: :ref:`Advisory TFV-4 (CVE-2017-9607)`
80 .. |TFV-5| replace:: :ref:`Advisory TFV-5 (CVE-2017-15031)`
81 .. |TFV-6| replace:: :ref:`Advisory TFV-6 (CVE-2017-5753, CVE-2017-5715, CVE-2017-5754)`
82 .. |TFV-7| replace:: :ref:`Advisory TFV-7 (CVE-2018-3639)`
83 .. |TFV-8| replace:: :ref:`Advisory TFV-8 (CVE-2018-19440)`
/external/libexif/
DNEWS8 and bug #3434545 (CVE-2012-2812, CVE-2012-2813, CVE-2012-2814,
9 CVE-2012-2836, CVE-2012-2837, CVE-2012-2840, CVE-2012-2841,
10 CVE-2012-2845)
28 * Fixed a heap buffer overflow during tag format conversion (CVE-2009-3895)
65 * Bug fixes: #1773810, #1774626, #1536244, CVE-2007-6351, CVE-2007-6352,
75 * Security fix: CVE-2006-4168 aka IDEF1514.
/external/arm-trusted-firmware/docs/security_advisories/
Dsecurity-advisory-tfv-6.rst1 Advisory TFV-6 (CVE-2017-5753, CVE-2017-5715, CVE-2017-5754)
8 | CVE ID | `CVE-2017-5753`_ / `CVE-2017-5715`_ / `CVE-2017-5754`_ |
33 Variant 1 (`CVE-2017-5753`_)
39 Variant 2 (`CVE-2017-5715`_)
66 implementing a specified `CVE-2017-5715`_ workaround SMC
69 Details of ``SMCCC_ARCH_WORKAROUND_1`` can be found in the `CVE-2017-5715
127 Variant 3 (`CVE-2017-5754`_)
141 .. _CVE-2017-5753: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753
142 .. _CVE-2017-5715: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
143 .. _CVE-2017-5754: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
Dsecurity-advisory-tfv-5.rst1 Advisory TFV-5 (CVE-2017-15031)
8 | CVE ID | `CVE-2017-15031`_ |
53 .. _CVE-2017-15031: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15031
Dsecurity-advisory-tfv-2.rst1 Advisory TFV-2 (CVE-2017-7564)
8 | CVE ID | `CVE-2017-7564`_ |
57 .. _CVE-2017-7564: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7564
/external/tcpdump/
DCHANGES9 CVE-2017-11543 (SLIP)
10 CVE-2017-13011 (bittok2str_internal)
12 CVE-2017-12989 (RESP)
13 CVE-2017-12990 (ISAKMP)
14 CVE-2017-12995 (DNS)
15 CVE-2017-12997 (LLDP)
17 CVE-2017-11541 (safeputs)
18 CVE-2017-11542 (PIMv1)
19 CVE-2017-12893 (SMB/CIFS)
20 CVE-2017-12894 (lookup_bytestring)
[all …]
/external/tensorflow/
DRELEASE.md164 ([CVE-2020-26266](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26266))
167 ([CVE-2020-26267](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26267))
170 ([CVE-2020-26268](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26268)
172 ([CVE-2020-26270](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26270))
175 ([CVE-2020-26271](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26271))
178 [CVE-2020-13790](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13790).
180 [CVE-2020-15250](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15250).
182 [CVE-2019-20838](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838)
184 [CVE-2020-14155](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155).
191 ([CVE-2020-26266](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26266))
[all …]
/external/icu/icu4c/source/data/curr/
Dur_IN.txt18 CVE{
19 "CVE",
52 CVE{
Dzh_Hant_HK.txt62 CVE{
63 "CVE",
315 CVE{
/external/rust/crates/ring/src/arithmetic/
Dbigint_elem_squared_tests.txt5 # Regression test for CVE-2015-3193 (carry propagation bug in sqr8x_reduction).
14 # Regression test for CVE-2017-3732.
23 # Regression test for CVE-2017-3736
/external/python/cpython2/Misc/NEWS.d/
D2.7.9.rst18 return. This resolves CVE-2013-1753.
27 CVE-2013-1752: smtplib: Limit amount of data read by limiting the call to
38 CVE-2013-1752.
/external/sqlite/
DREADME.version3 This patch fixes CVE-2020-15358 and CVE-2020-13871, b/192605364 and b/192606047
/external/libpng/
DANNOUNCE31 * Fixed a use-after-free vulnerability (CVE-2019-7317) in png_image_free.
34 * Fixed two vulnerabilities (CVE-2018-14048, CVE-2018-14550) in
/external/python/cryptography/docs/
Ddoing-a-release.rst12 * Request a `CVE from MITRE`_. Once you have received the CVE, it should be
13 included in the :doc:`changelog`. Ideally you should request the CVE before
14 starting the release process so that the CVE is available at the time of the
95 .. _`CVE from MITRE`: https://cveform.mitre.org/
/external/wycheproof/doc/
Ddh.md104 CVE-2015-3193: The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl
107 https://blog.fuzzing-project.org/31-Fuzzing-Math-miscalculations-in-OpenSSLs-BN_mod_exp-CVE-2015-31…
109 CVE-2016-0739: libssh before 0.7.3 improperly truncates ephemeral secrets generated for the
112 CVE-2015-1787 The ssl3_get_client_key_exchange function in s3_srvr.c in OpenSSL 1.0.2 before
117 CVE-2015-0205 The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p
123 CVE-2016-0701 The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before
129 CVE-2006-1115 nCipher HSM before 2.22.6, when generating a Diffie-Hellman public/private key
133 CVE-2015-1716 Schannel in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server
139 CVE-2015-2419: Random generation of the prime p allows Pohlig-Hellman and probably other
/external/tensorflow/tensorflow/security/advisory/
Dtfsa-2018-002.md3 ### CVE Number
5 CVE-2018-7576
Dtfsa-2018-006.md3 ### CVE Number
5 CVE-2018-10055
Dtfsa-2018-001.md3 ### CVE Number
5 CVE-2018-21233
Dtfsa-2020-028.md3 ### CVE Number
4 CVE-2020-15266
/external/ImageMagick/
DSECURITY.md13 In addition, request a [CVE](https://cve.mitre.org/cve/request_id.html). We rely on you to post CV…

12345678910>>...15