Home
last modified time | relevance | path

Searched refs:malicious (Results 1 – 25 of 32) sorted by relevance

12

/src/sys/dev/ice/
H A Dice_vf_mbx.c419 if (is_malvf && !vf_info->malicious) { in ice_mbx_vf_state_handler()
420 vf_info->malicious = 1; in ice_mbx_vf_state_handler()
436 vf_info->malicious = 0; in ice_mbx_clear_malvf()
H A Dice_type.h1032 u8 malicious : 1; member
/src/crypto/openssl/doc/man3/
H A DSSL_CTX_set_max_cert_list.pod38 received from a faulty or malicious peer, a maximum size for the certificate
H A DSSL_CTX_dane_enable.pod149 checks due to "unknown key share" attacks, in which a malicious server can
151 connection to the malicious server.
152 The malicious server may then be able to violate cross-origin scripting
H A DSSL_new_listener.pod176 address validation exposes the server to malicious clients that may open large
/src/sys/contrib/device-tree/Bindings/pci/
H A Dpci.txt72 malicious devices to this port.
/src/sys/contrib/openzfs/etc/default/
H A Dzfs.in48 # SAN to prevent the insertion of malicious pools.
/src/contrib/ntp/
H A DNEWS439 explicitly trusted source to send a crafted malicious mode 6 (ntpq)
648 specify which IPs can serve time, a malicious authenticated peer
690 malicious data could become injectable/executable code.
708 A malicious mode 6 packet can be sent to an ntpd instance, and
734 ntp.keys file to specify which IPs can serve time, a malicious
922 somehow control a malicious /dev/datum device, this does not
1199 any malicious usage for this vulnerability. Specifically, no
1212 malicious ntpd (Medium)
1220 A stack buffer overflow in ntpq can be triggered by a malicious
1227 a malicious server, and affects ntpq, not ntpd.
[all …]
/src/share/examples/ipfilter/
H A Dexamples.txt116 The problem arises that fragments can actually be a non-malicious. The
117 really malicious ones can be grouped under the term "short fragments" and
H A Dipf-howto.txt2547 to. It won't stop a malicious hacker with root access from
2550 vices safe, cozy and warm even on a malicious LAN. A big
/src/crypto/openssl/doc/man1/
H A Dopenssl-s_client.pod.in397 checks due to "unknown key share" attacks, in which a malicious server can
399 connection to the malicious server.
400 The malicious server may then be able to violate cross-origin scripting
/src/contrib/llvm-project/lld/docs/
H A DNewLLD.rst12 or malicious object files. A corrupted file could cause a fatal error or SEGV.
/src/contrib/llvm-project/clang/include/clang/StaticAnalyzer/Core/
H A DAnalyzerOptions.def353 "no malicious data. For instance, if this option is enabled, 'getenv()' "
/src/crypto/openssl/
H A DCHANGES.md1208 manner. A malicious client could deliberately create the scenario for this
1929 for that certificate. A malicious CA could use this to deliberately assert
2164 In a TLS client, this can be triggered by connecting to a malicious
2166 client authentication and a malicious client connects.
2204 have signed the malicious certificate or for the application to continue
2208 In a TLS client, this can be triggered by connecting to a malicious
2210 client authentication and a malicious client connects.
2212 An attacker can craft a malicious email address to overflow
2218 An attacker can craft a malicious email address to overflow four
4135 A malicious attacker who is able present SM2 content for decryption to
[all …]
H A DNEWS.md1534 * Introduce limits to prevent malicious key DoS ([CVE-2006-2940])
1639 * Introduce limits to prevent malicious key DoS ([CVE-2006-2940])
/src/crypto/heimdal/appl/telnet/
H A DChangeLog222 malicious telnet server or active network attacker to cause
/src/contrib/unbound/doc/
H A Dunbound-control.rst1283 performance of the hash table, hash values are incorrect or malicious.
1291 performance of the hash table, hash values are incorrect or malicious.
/src/share/doc/IPv6/
H A DIMPLEMENTATION390 nd6_debug must be set to 0. If you leave it to 1, malicious parties
1329 This is to avoid malicious use of IPv4 mapped address in IPv6 native
1410 IPv4 address (if they are in IPv6 native packet header, they are malicious)
1419 IPv4 address (if they are in IPv6 native packet header, they are malicious).
/src/contrib/ntp/ntpd/
H A Dntp.conf.def402 to avoid accidental or malicious disruption in this mode, both the
415 accidental or malicious disruption in this mode, both the server
428 in order to avoid accidental or malicious disruption in this mode,
1438 be useful for keeping unwanted or broken or malicious clients
H A Dinvoke-ntp.conf.texi357 to avoid accidental or malicious disruption in this mode, both the
370 accidental or malicious disruption in this mode, both the server
383 in order to avoid accidental or malicious disruption in this mode,
1371 be useful for keeping unwanted or broken or malicious clients
/src/contrib/libpcap/
H A Dconfigure.ac1723 dnl libpcap, exposing it to malicious servers.
1734 AC_WARN([to attacks by malicious remote capture servers!])
/src/contrib/xz/
H A DChangeLog4167 1. A malicious maintainer could make more than one variant of
4169 with malicious content could be targeted to specific users,
4170 for example, distributing the malicious version on a mirror
4367 argument handling which can be exploited with malicious filenames.
13575 …more vulnerable to attacks, such as the tag being moved to a malicious commit or a malicious commi…
13601 …more vulnerable to attacks, such as the tag being moved to a malicious commit or a malicious commi…
/src/contrib/file/magic/Magdir/
H A Dwindows1195 # look for icon file directive maybe pointing to malicious file
/src/contrib/tnftp/
H A DChangeLog834 - avoid buffer overrun on PASV from malicious server.
/src/crypto/openssh/
H A Dconfigure.ac5893 echo "ssh-agent. Their absence increases the risk that a malicious"

12