/dports/www/chromium-legacy/chromium-88.0.4324.182/components/policy/resources/ |
H A D | policy_templates.json | 8405 …mber of days can negatively impact security, because it gives potential attackers more time to fin… 14238 …rant this permission if the extension is trusted to secure access to the key against attackers.''',
|
/dports/textproc/link-grammar/link-grammar-5.8.0/data/en/words/ |
H A D | words.n.2.s | 567 attackers.n
|
/dports/security/gnutls/gnutls-3.6.16/doc/ |
H A D | gnutls-api.texi | 7199 In order to prevent attackers from guessing valid usernames, 7225 In order to prevent attackers from guessing valid usernames,
|
/dports/security/tor/tor-0.4.6.8/src/config/ |
H A D | torrc.sample.in | 59 ## authentication methods, to prevent attackers from accessing it.
|
H A D | torrc.minimal.in | 58 ## authentication methods, to prevent attackers from accessing it.
|
/dports/security/openssl/openssl-1.1.1n/ |
H A D | CHANGES | 1254 likely only accessible to a limited number of attackers. An attacker would 1332 likely only accessible to a limited number of attackers. An attacker would 2836 likely only accessible to a limited number of attackers. An attacker would 9683 are directly visible to potential attackers, but the information
|
/dports/security/sshguard/sshguard-2.4.2/doc/ |
H A D | sshguard.8.rst | 54 Block attackers when their cumulative attack score exceeds *threshold*. 65 Block attackers for initially *blocktime* seconds after exceeding 72 Remember potential attackers for up to *detection_time* seconds before
|
/dports/security/tor-devel/tor-0.4.7.2-alpha/src/config/ |
H A D | torrc.sample.in | 59 ## authentication methods, to prevent attackers from accessing it.
|
H A D | torrc.minimal.in | 58 ## authentication methods, to prevent attackers from accessing it.
|
/dports/devel/autoconf/autoconf-2.69/doc/ |
H A D | autoconf.texi | 19184 use a file inside this directory. Both methods prevent attackers from
|
H A D | autoconf.texi.orig | 19187 use a file inside this directory. Both methods prevent attackers from
|
/dports/net/nepenthes/nepenthes-0.2.2/ |
H A D | CHANGES | 188 …* create a mirror connection between to the attacker to "emulate" the vuln using the attackers own…
|
/dports/net/isc-dhcp44-client/dhcp-4.4.2-P1/ |
H A D | RELNOTES | 1734 exit if it attempted to hash a zero length client id, providing attackers 2527 remote attackers to execute arbitrary commands as root on the system, 3950 attackers to gain arbitrary root access on systems using ISC DHCP 3.0.1
|
/dports/net/isc-dhcp44-relay/dhcp-4.4.2-P1/ |
H A D | RELNOTES | 1734 exit if it attempted to hash a zero length client id, providing attackers 2527 remote attackers to execute arbitrary commands as root on the system, 3950 attackers to gain arbitrary root access on systems using ISC DHCP 3.0.1
|
/dports/net/isc-dhcp44-server/dhcp-4.4.2-P1/ |
H A D | RELNOTES | 1734 exit if it attempted to hash a zero length client id, providing attackers 2527 remote attackers to execute arbitrary commands as root on the system, 3950 attackers to gain arbitrary root access on systems using ISC DHCP 3.0.1
|
/dports/games/sjeng/Sjeng-Free-11.2/ |
H A D | attacks.c | 36 int attackers = 0; in calc_attackers() local 49 attackers++; in calc_attackers() 58 attackers++; in calc_attackers() 73 attackers++; in calc_attackers() 79 attackers++; in calc_attackers() 87 attackers++; in calc_attackers() 100 attackers++; in calc_attackers() 116 attackers++; in calc_attackers() 139 attackers++; in calc_attackers() 145 attackers++; in calc_attackers() [all …]
|
/dports/games/evq3/evq3/code/game/ |
H A D | ai_team.c | 391 if (attackers > 5) attackers = 5; in BotCTFOrders_BothFlagsNotAtBase() 498 if (attackers > 6) attackers = 6; in BotCTFOrders_FlagNotAtBase() 561 if (attackers > 7) attackers = 7; in BotCTFOrders_FlagNotAtBase() 634 if (attackers > 3) attackers = 3; in BotCTFOrders_EnemyFlagNotAtBase() 743 if (attackers > 4) attackers = 4; in BotCTFOrders_BothFlagsAtBase() 805 if (attackers > 5) attackers = 5; in BotCTFOrders_BothFlagsAtBase() 1002 if (attackers > 4) attackers = 4; in Bot1FCTFOrders_FlagAtCenter() 1066 if (attackers > 6) attackers = 6; in Bot1FCTFOrders_FlagAtCenter() 1159 if (attackers > 7) attackers = 7; in Bot1FCTFOrders_TeamHasFlag() 1255 if (attackers > 8) attackers = 8; in Bot1FCTFOrders_TeamHasFlag() [all …]
|
/dports/dns/libidn/libidn-1.35/doc/ |
H A D | libidn.texi | 1349 that attackers may try to use the peculiarities in these strings to
|
/dports/devel/viewvc-devel/viewvc-c93d9da79c31457ecb0a771ff52d28353dc6e878/notes/ |
H A D | SECURITY.md | 8 …cripting vulnerability in `viewcvs.cgi` for ViewCVS 0.9.2 allows remote attackers to inject script… 15 …t the `hide_cvsroot` and `forbidden` settings, which could allow remote attackers to gain sensitiv… 22 …ross-site scripting (XSS) vulnerabilities in ViewCVS 0.9.2 allow remote attackers to inject arbitr… 29 … CRLF injection vulnerability in viewcvs in ViewCVS 0.9.2 allows remote attackers to inject arbitr… 43 …fy a charset in its HTTP headers or HTML documents, which allows remote attackers to conduct cross… 50 … results that list CVS or Subversion (SVN) commits, which allows remote attackers to obtain sensit… 57 …nder the web root with insufficient access control, which allows remote attackers to read files an… 99 …ew without using the authorizer for each root, which might allow remote attackers to discover priv… 106 … specify an unsupported authorizer for a root, which might allow remote attackers to bypass intend… 120 …ewvc.py` in ViewVC before 1.0.10, and 1.1.x before 1.1.4, allows remote attackers to inject arbitr… [all …]
|
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/botan/doc/api_ref/ |
H A D | credentials_manager.rst | 170 attackers address from the victim, but increases their
|
/dports/mail/thunderbird/thunderbird-91.8.0/third_party/python/ecdsa/ecdsa-0.15.dist-info/ |
H A D | METADATA | 248 Do not allow attackers to measure how long it takes you to generate a keypair 249 or sign a message. Do not allow attackers to run code on the same physical 251 virtual machines). Do not allow attackers to measure how much power your 253 attackers to measure RF interference coming from your computer while generating
|
/dports/mail/thunderbird/thunderbird-91.8.0/docs/bug-mgmt/processes/ |
H A D | fixing-security-bugs.rst | 114 fixes into the hands of our users faster than attackers can weaponize
|
/dports/mail/thunderbird/thunderbird-91.8.0/devtools/client/locales/en-US/ |
H A D | webconsole.properties | 102 …g: Take care when pasting things you don’t understand. This could allow attackers to steal your id…
|
/dports/www/firefox/firefox-99.0/third_party/python/ecdsa/ecdsa-0.15.dist-info/ |
H A D | METADATA | 248 Do not allow attackers to measure how long it takes you to generate a keypair 249 or sign a message. Do not allow attackers to run code on the same physical 251 virtual machines). Do not allow attackers to measure how much power your 253 attackers to measure RF interference coming from your computer while generating
|
/dports/www/firefox/firefox-99.0/security/nss/doc/rst/legacy/nss_releases/nss_3.19.4_release_notes/ |
H A D | index.rst | 54 attackers to bypass security checks and obtain control of arbitrary memory.
|