Searched refs:CVE (Results 1 – 25 of 371) sorted by relevance
12345678910>>...15
/external/dng_sdk/fuzzer/ |
D | README.md | 8 * CVE-2020-9589 9 * CVE-2020-9590 10 * CVE-2020-9620 11 * CVE-2020-9621 12 * CVE-2020-9622 13 * CVE-2020-9623 14 * CVE-2020-9624 15 * CVE-2020-9625 16 * CVE-2020-9626 17 * CVE-2020-9627 [all …]
|
/external/rust/crates/libz-sys/src/zlib-ng/test/ |
D | README.md | 6 |[CVE-2003-0107.c](https://nvd.nist.gov/vuln/detail/CVE-2003-0107)|Buffer overflow in the gzprintf … 7 |[CVE-2002-0059](https://nvd.nist.gov/vuln/detail/CVE-2002-0059)|inflateEnd to release memory more … 8 |[CVE-2004-0797](https://nvd.nist.gov/vuln/detail/CVE-2004-0797)|Error handling in inflate and infl… 9 |[CVE-2005-1849](https://nvd.nist.gov/vuln/detail/CVE-2005-1849)|inftrees.h bug causes crash| 10 |[CVE-2005-2096](https://nvd.nist.gov/vuln/detail/CVE-2005-2096)|Buffer overflow when incomplete co…
|
D | Makefile.in | 80 testCVE-2003-0107: CVE-2003-0107$(EXE) check_cross_dep 81 @if ${QEMU_RUN} ./CVE-2003-0107$(EXE); then \ 87 CVE-2003-0107.o: $(SRCDIR)/CVE-2003-0107.c 88 $(CC) $(CFLAGS) -I.. -I$(SRCTOP) -c -o $@ $(SRCDIR)/CVE-2003-0107.c 90 CVE-2003-0107$(EXE): CVE-2003-0107.o 91 $(CC) $(CFLAGS) -o $@ CVE-2003-0107.o $(TEST_LDFLAGS) 109 rm -f CVE-2003-0107$(EXE) switchlevels$(EXE)
|
D | testCVEinputs.sh | 15 for CVE in $CVEs; do 17 for testcase in ${TESTDIR}/${CVE}/*.gz; do 26 echo " --- zlib not vulnerable to $CVE ---"; 28 echo " --- zlib VULNERABLE to $CVE ---"; exit 1;
|
/external/python/cpython3/Misc/NEWS.d/ |
D | 3.6.2rc2.rst | 20 vulnerabilities including: CVE-2017-9233 (External entity infinite loop 21 DoS), CVE-2016-9063 (Integer overflow, re-fix), CVE-2016-0718 (Fix 22 regression bugs from 2.2.0's fix to CVE-2016-0718) and CVE-2012-0876 23 (Counter hash flooding with SipHash). Note: the CVE-2016-5300 (Use
|
/external/arm-trusted-firmware/docs/process/ |
D | security.rst | 76 .. |TFV-1| replace:: :ref:`Advisory TFV-1 (CVE-2016-10319)` 77 .. |TFV-2| replace:: :ref:`Advisory TFV-2 (CVE-2017-7564)` 78 .. |TFV-3| replace:: :ref:`Advisory TFV-3 (CVE-2017-7563)` 79 .. |TFV-4| replace:: :ref:`Advisory TFV-4 (CVE-2017-9607)` 80 .. |TFV-5| replace:: :ref:`Advisory TFV-5 (CVE-2017-15031)` 81 .. |TFV-6| replace:: :ref:`Advisory TFV-6 (CVE-2017-5753, CVE-2017-5715, CVE-2017-5754)` 82 .. |TFV-7| replace:: :ref:`Advisory TFV-7 (CVE-2018-3639)` 83 .. |TFV-8| replace:: :ref:`Advisory TFV-8 (CVE-2018-19440)`
|
/external/libexif/ |
D | NEWS | 8 and bug #3434545 (CVE-2012-2812, CVE-2012-2813, CVE-2012-2814, 9 CVE-2012-2836, CVE-2012-2837, CVE-2012-2840, CVE-2012-2841, 10 CVE-2012-2845) 28 * Fixed a heap buffer overflow during tag format conversion (CVE-2009-3895) 65 * Bug fixes: #1773810, #1774626, #1536244, CVE-2007-6351, CVE-2007-6352, 75 * Security fix: CVE-2006-4168 aka IDEF1514.
|
/external/arm-trusted-firmware/docs/security_advisories/ |
D | security-advisory-tfv-6.rst | 1 Advisory TFV-6 (CVE-2017-5753, CVE-2017-5715, CVE-2017-5754) 8 | CVE ID | `CVE-2017-5753`_ / `CVE-2017-5715`_ / `CVE-2017-5754`_ | 33 Variant 1 (`CVE-2017-5753`_) 39 Variant 2 (`CVE-2017-5715`_) 66 implementing a specified `CVE-2017-5715`_ workaround SMC 69 Details of ``SMCCC_ARCH_WORKAROUND_1`` can be found in the `CVE-2017-5715 127 Variant 3 (`CVE-2017-5754`_) 141 .. _CVE-2017-5753: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753 142 .. _CVE-2017-5715: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715 143 .. _CVE-2017-5754: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754
|
D | security-advisory-tfv-5.rst | 1 Advisory TFV-5 (CVE-2017-15031) 8 | CVE ID | `CVE-2017-15031`_ | 53 .. _CVE-2017-15031: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15031
|
D | security-advisory-tfv-2.rst | 1 Advisory TFV-2 (CVE-2017-7564) 8 | CVE ID | `CVE-2017-7564`_ | 57 .. _CVE-2017-7564: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7564
|
/external/tcpdump/ |
D | CHANGES | 9 CVE-2017-11543 (SLIP) 10 CVE-2017-13011 (bittok2str_internal) 12 CVE-2017-12989 (RESP) 13 CVE-2017-12990 (ISAKMP) 14 CVE-2017-12995 (DNS) 15 CVE-2017-12997 (LLDP) 17 CVE-2017-11541 (safeputs) 18 CVE-2017-11542 (PIMv1) 19 CVE-2017-12893 (SMB/CIFS) 20 CVE-2017-12894 (lookup_bytestring) [all …]
|
/external/tensorflow/ |
D | RELEASE.md | 164 ([CVE-2020-26266](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26266)) 167 ([CVE-2020-26267](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26267)) 170 ([CVE-2020-26268](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26268) 172 ([CVE-2020-26270](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26270)) 175 ([CVE-2020-26271](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26271)) 178 [CVE-2020-13790](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13790). 180 [CVE-2020-15250](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15250). 182 [CVE-2019-20838](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20838) 184 [CVE-2020-14155](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14155). 191 ([CVE-2020-26266](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26266)) [all …]
|
/external/icu/icu4c/source/data/curr/ |
D | ur_IN.txt | 18 CVE{ 19 "CVE", 52 CVE{
|
D | zh_Hant_HK.txt | 62 CVE{ 63 "CVE", 315 CVE{
|
/external/rust/crates/ring/src/arithmetic/ |
D | bigint_elem_squared_tests.txt | 5 # Regression test for CVE-2015-3193 (carry propagation bug in sqr8x_reduction). 14 # Regression test for CVE-2017-3732. 23 # Regression test for CVE-2017-3736
|
/external/python/cpython2/Misc/NEWS.d/ |
D | 2.7.9.rst | 18 return. This resolves CVE-2013-1753. 27 CVE-2013-1752: smtplib: Limit amount of data read by limiting the call to 38 CVE-2013-1752.
|
/external/sqlite/ |
D | README.version | 3 This patch fixes CVE-2020-15358 and CVE-2020-13871, b/192605364 and b/192606047
|
/external/libpng/ |
D | ANNOUNCE | 31 * Fixed a use-after-free vulnerability (CVE-2019-7317) in png_image_free. 34 * Fixed two vulnerabilities (CVE-2018-14048, CVE-2018-14550) in
|
/external/python/cryptography/docs/ |
D | doing-a-release.rst | 12 * Request a `CVE from MITRE`_. Once you have received the CVE, it should be 13 included in the :doc:`changelog`. Ideally you should request the CVE before 14 starting the release process so that the CVE is available at the time of the 95 .. _`CVE from MITRE`: https://cveform.mitre.org/
|
/external/wycheproof/doc/ |
D | dh.md | 104 CVE-2015-3193: The Montgomery squaring implementation in crypto/bn/asm/x86_64-mont5.pl 107 https://blog.fuzzing-project.org/31-Fuzzing-Math-miscalculations-in-OpenSSLs-BN_mod_exp-CVE-2015-31… 109 CVE-2016-0739: libssh before 0.7.3 improperly truncates ephemeral secrets generated for the 112 CVE-2015-1787 The ssl3_get_client_key_exchange function in s3_srvr.c in OpenSSL 1.0.2 before 117 CVE-2015-0205 The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p 123 CVE-2016-0701 The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 129 CVE-2006-1115 nCipher HSM before 2.22.6, when generating a Diffie-Hellman public/private key 133 CVE-2015-1716 Schannel in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 139 CVE-2015-2419: Random generation of the prime p allows Pohlig-Hellman and probably other
|
/external/tensorflow/tensorflow/security/advisory/ |
D | tfsa-2018-002.md | 3 ### CVE Number 5 CVE-2018-7576
|
D | tfsa-2018-006.md | 3 ### CVE Number 5 CVE-2018-10055
|
D | tfsa-2018-001.md | 3 ### CVE Number 5 CVE-2018-21233
|
D | tfsa-2020-028.md | 3 ### CVE Number 4 CVE-2020-15266
|
/external/ImageMagick/ |
D | SECURITY.md | 13 In addition, request a [CVE](https://cve.mitre.org/cve/request_id.html). We rely on you to post CV…
|
12345678910>>...15