| /src/sys/dev/ice/ |
| H A D | ice_vf_mbx.c | 419 if (is_malvf && !vf_info->malicious) { in ice_mbx_vf_state_handler() 420 vf_info->malicious = 1; in ice_mbx_vf_state_handler() 436 vf_info->malicious = 0; in ice_mbx_clear_malvf()
|
| H A D | ice_type.h | 1032 u8 malicious : 1; member
|
| /src/crypto/openssl/doc/man3/ |
| H A D | SSL_CTX_set_max_cert_list.pod | 38 received from a faulty or malicious peer, a maximum size for the certificate
|
| H A D | SSL_CTX_dane_enable.pod | 149 checks due to "unknown key share" attacks, in which a malicious server can 151 connection to the malicious server. 152 The malicious server may then be able to violate cross-origin scripting
|
| H A D | SSL_new_listener.pod | 176 address validation exposes the server to malicious clients that may open large
|
| /src/sys/contrib/device-tree/Bindings/pci/ |
| H A D | pci.txt | 72 malicious devices to this port.
|
| /src/sys/contrib/openzfs/etc/default/ |
| H A D | zfs.in | 48 # SAN to prevent the insertion of malicious pools.
|
| /src/contrib/ntp/ |
| H A D | NEWS | 439 explicitly trusted source to send a crafted malicious mode 6 (ntpq) 648 specify which IPs can serve time, a malicious authenticated peer 690 malicious data could become injectable/executable code. 708 A malicious mode 6 packet can be sent to an ntpd instance, and 734 ntp.keys file to specify which IPs can serve time, a malicious 922 somehow control a malicious /dev/datum device, this does not 1199 any malicious usage for this vulnerability. Specifically, no 1212 malicious ntpd (Medium) 1220 A stack buffer overflow in ntpq can be triggered by a malicious 1227 a malicious server, and affects ntpq, not ntpd. [all …]
|
| /src/share/examples/ipfilter/ |
| H A D | examples.txt | 116 The problem arises that fragments can actually be a non-malicious. The 117 really malicious ones can be grouped under the term "short fragments" and
|
| H A D | ipf-howto.txt | 2547 to. It won't stop a malicious hacker with root access from 2550 vices safe, cozy and warm even on a malicious LAN. A big
|
| /src/crypto/openssl/doc/man1/ |
| H A D | openssl-s_client.pod.in | 397 checks due to "unknown key share" attacks, in which a malicious server can 399 connection to the malicious server. 400 The malicious server may then be able to violate cross-origin scripting
|
| /src/contrib/llvm-project/lld/docs/ |
| H A D | NewLLD.rst | 12 or malicious object files. A corrupted file could cause a fatal error or SEGV.
|
| /src/contrib/llvm-project/clang/include/clang/StaticAnalyzer/Core/ |
| H A D | AnalyzerOptions.def | 353 "no malicious data. For instance, if this option is enabled, 'getenv()' "
|
| /src/crypto/openssl/ |
| H A D | CHANGES.md | 1208 manner. A malicious client could deliberately create the scenario for this 1929 for that certificate. A malicious CA could use this to deliberately assert 2164 In a TLS client, this can be triggered by connecting to a malicious 2166 client authentication and a malicious client connects. 2204 have signed the malicious certificate or for the application to continue 2208 In a TLS client, this can be triggered by connecting to a malicious 2210 client authentication and a malicious client connects. 2212 An attacker can craft a malicious email address to overflow 2218 An attacker can craft a malicious email address to overflow four 4135 A malicious attacker who is able present SM2 content for decryption to [all …]
|
| H A D | NEWS.md | 1534 * Introduce limits to prevent malicious key DoS ([CVE-2006-2940]) 1639 * Introduce limits to prevent malicious key DoS ([CVE-2006-2940])
|
| /src/crypto/heimdal/appl/telnet/ |
| H A D | ChangeLog | 222 malicious telnet server or active network attacker to cause
|
| /src/contrib/unbound/doc/ |
| H A D | unbound-control.rst | 1283 performance of the hash table, hash values are incorrect or malicious. 1291 performance of the hash table, hash values are incorrect or malicious.
|
| /src/share/doc/IPv6/ |
| H A D | IMPLEMENTATION | 390 nd6_debug must be set to 0. If you leave it to 1, malicious parties 1329 This is to avoid malicious use of IPv4 mapped address in IPv6 native 1410 IPv4 address (if they are in IPv6 native packet header, they are malicious) 1419 IPv4 address (if they are in IPv6 native packet header, they are malicious).
|
| /src/contrib/ntp/ntpd/ |
| H A D | ntp.conf.def | 402 to avoid accidental or malicious disruption in this mode, both the 415 accidental or malicious disruption in this mode, both the server 428 in order to avoid accidental or malicious disruption in this mode, 1438 be useful for keeping unwanted or broken or malicious clients
|
| H A D | invoke-ntp.conf.texi | 357 to avoid accidental or malicious disruption in this mode, both the 370 accidental or malicious disruption in this mode, both the server 383 in order to avoid accidental or malicious disruption in this mode, 1371 be useful for keeping unwanted or broken or malicious clients
|
| /src/contrib/libpcap/ |
| H A D | configure.ac | 1723 dnl libpcap, exposing it to malicious servers. 1734 AC_WARN([to attacks by malicious remote capture servers!])
|
| /src/contrib/xz/ |
| H A D | ChangeLog | 4167 1. A malicious maintainer could make more than one variant of 4169 with malicious content could be targeted to specific users, 4170 for example, distributing the malicious version on a mirror 4367 argument handling which can be exploited with malicious filenames. 13575 …more vulnerable to attacks, such as the tag being moved to a malicious commit or a malicious commi… 13601 …more vulnerable to attacks, such as the tag being moved to a malicious commit or a malicious commi…
|
| /src/contrib/file/magic/Magdir/ |
| H A D | windows | 1195 # look for icon file directive maybe pointing to malicious file
|
| /src/contrib/tnftp/ |
| H A D | ChangeLog | 834 - avoid buffer overrun on PASV from malicious server.
|
| /src/crypto/openssh/ |
| H A D | configure.ac | 5893 echo "ssh-agent. Their absence increases the risk that a malicious"
|