Home
last modified time | relevance | path

Searched refs:attackers (Results 1 – 25 of 1643) sorted by last modified time

12345678910>>...66

/dports/www/chromium-legacy/chromium-88.0.4324.182/components/policy/resources/
H A Dpolicy_templates.json8405 …mber of days can negatively impact security, because it gives potential attackers more time to fin…
14238 …rant this permission if the extension is trusted to secure access to the key against attackers.''',
/dports/textproc/link-grammar/link-grammar-5.8.0/data/en/words/
H A Dwords.n.2.s567 attackers.n
/dports/security/gnutls/gnutls-3.6.16/doc/
H A Dgnutls-api.texi7199 In order to prevent attackers from guessing valid usernames,
7225 In order to prevent attackers from guessing valid usernames,
/dports/security/tor/tor-0.4.6.8/src/config/
H A Dtorrc.sample.in59 ## authentication methods, to prevent attackers from accessing it.
H A Dtorrc.minimal.in58 ## authentication methods, to prevent attackers from accessing it.
/dports/security/openssl/openssl-1.1.1n/
H A DCHANGES1254 likely only accessible to a limited number of attackers. An attacker would
1332 likely only accessible to a limited number of attackers. An attacker would
2836 likely only accessible to a limited number of attackers. An attacker would
9683 are directly visible to potential attackers, but the information
/dports/security/sshguard/sshguard-2.4.2/doc/
H A Dsshguard.8.rst54 Block attackers when their cumulative attack score exceeds *threshold*.
65 Block attackers for initially *blocktime* seconds after exceeding
72 Remember potential attackers for up to *detection_time* seconds before
/dports/security/tor-devel/tor-0.4.7.2-alpha/src/config/
H A Dtorrc.sample.in59 ## authentication methods, to prevent attackers from accessing it.
H A Dtorrc.minimal.in58 ## authentication methods, to prevent attackers from accessing it.
/dports/devel/autoconf/autoconf-2.69/doc/
H A Dautoconf.texi19184 use a file inside this directory. Both methods prevent attackers from
H A Dautoconf.texi.orig19187 use a file inside this directory. Both methods prevent attackers from
/dports/net/nepenthes/nepenthes-0.2.2/
H A DCHANGES188 …* create a mirror connection between to the attacker to "emulate" the vuln using the attackers own…
/dports/net/isc-dhcp44-client/dhcp-4.4.2-P1/
H A DRELNOTES1734 exit if it attempted to hash a zero length client id, providing attackers
2527 remote attackers to execute arbitrary commands as root on the system,
3950 attackers to gain arbitrary root access on systems using ISC DHCP 3.0.1
/dports/net/isc-dhcp44-relay/dhcp-4.4.2-P1/
H A DRELNOTES1734 exit if it attempted to hash a zero length client id, providing attackers
2527 remote attackers to execute arbitrary commands as root on the system,
3950 attackers to gain arbitrary root access on systems using ISC DHCP 3.0.1
/dports/net/isc-dhcp44-server/dhcp-4.4.2-P1/
H A DRELNOTES1734 exit if it attempted to hash a zero length client id, providing attackers
2527 remote attackers to execute arbitrary commands as root on the system,
3950 attackers to gain arbitrary root access on systems using ISC DHCP 3.0.1
/dports/games/sjeng/Sjeng-Free-11.2/
H A Dattacks.c36 int attackers = 0; in calc_attackers() local
49 attackers++; in calc_attackers()
58 attackers++; in calc_attackers()
73 attackers++; in calc_attackers()
79 attackers++; in calc_attackers()
87 attackers++; in calc_attackers()
100 attackers++; in calc_attackers()
116 attackers++; in calc_attackers()
139 attackers++; in calc_attackers()
145 attackers++; in calc_attackers()
[all …]
/dports/games/evq3/evq3/code/game/
H A Dai_team.c391 if (attackers > 5) attackers = 5; in BotCTFOrders_BothFlagsNotAtBase()
498 if (attackers > 6) attackers = 6; in BotCTFOrders_FlagNotAtBase()
561 if (attackers > 7) attackers = 7; in BotCTFOrders_FlagNotAtBase()
634 if (attackers > 3) attackers = 3; in BotCTFOrders_EnemyFlagNotAtBase()
743 if (attackers > 4) attackers = 4; in BotCTFOrders_BothFlagsAtBase()
805 if (attackers > 5) attackers = 5; in BotCTFOrders_BothFlagsAtBase()
1002 if (attackers > 4) attackers = 4; in Bot1FCTFOrders_FlagAtCenter()
1066 if (attackers > 6) attackers = 6; in Bot1FCTFOrders_FlagAtCenter()
1159 if (attackers > 7) attackers = 7; in Bot1FCTFOrders_TeamHasFlag()
1255 if (attackers > 8) attackers = 8; in Bot1FCTFOrders_TeamHasFlag()
[all …]
/dports/dns/libidn/libidn-1.35/doc/
H A Dlibidn.texi1349 that attackers may try to use the peculiarities in these strings to
/dports/devel/viewvc-devel/viewvc-c93d9da79c31457ecb0a771ff52d28353dc6e878/notes/
H A DSECURITY.md8 …cripting vulnerability in `viewcvs.cgi` for ViewCVS 0.9.2 allows remote attackers to inject script…
15 …t the `hide_cvsroot` and `forbidden` settings, which could allow remote attackers to gain sensitiv…
22 …ross-site scripting (XSS) vulnerabilities in ViewCVS 0.9.2 allow remote attackers to inject arbitr…
29 … CRLF injection vulnerability in viewcvs in ViewCVS 0.9.2 allows remote attackers to inject arbitr…
43 …fy a charset in its HTTP headers or HTML documents, which allows remote attackers to conduct cross…
50 … results that list CVS or Subversion (SVN) commits, which allows remote attackers to obtain sensit…
57 …nder the web root with insufficient access control, which allows remote attackers to read files an…
99 …ew without using the authorizer for each root, which might allow remote attackers to discover priv…
106 … specify an unsupported authorizer for a root, which might allow remote attackers to bypass intend…
120 …ewvc.py` in ViewVC before 1.0.10, and 1.1.x before 1.1.4, allows remote attackers to inject arbitr…
[all …]
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/botan/doc/api_ref/
H A Dcredentials_manager.rst170 attackers address from the victim, but increases their
/dports/mail/thunderbird/thunderbird-91.8.0/third_party/python/ecdsa/ecdsa-0.15.dist-info/
H A DMETADATA248 Do not allow attackers to measure how long it takes you to generate a keypair
249 or sign a message. Do not allow attackers to run code on the same physical
251 virtual machines). Do not allow attackers to measure how much power your
253 attackers to measure RF interference coming from your computer while generating
/dports/mail/thunderbird/thunderbird-91.8.0/docs/bug-mgmt/processes/
H A Dfixing-security-bugs.rst114 fixes into the hands of our users faster than attackers can weaponize
/dports/mail/thunderbird/thunderbird-91.8.0/devtools/client/locales/en-US/
H A Dwebconsole.properties102 …g: Take care when pasting things you don’t understand. This could allow attackers to steal your id…
/dports/www/firefox/firefox-99.0/third_party/python/ecdsa/ecdsa-0.15.dist-info/
H A DMETADATA248 Do not allow attackers to measure how long it takes you to generate a keypair
249 or sign a message. Do not allow attackers to run code on the same physical
251 virtual machines). Do not allow attackers to measure how much power your
253 attackers to measure RF interference coming from your computer while generating
/dports/www/firefox/firefox-99.0/security/nss/doc/rst/legacy/nss_releases/nss_3.19.4_release_notes/
H A Dindex.rst54 attackers to bypass security checks and obtain control of arbitrary memory.

12345678910>>...66