1
0
mirror of https://github.com/nmap/nmap.git synced 2026-01-29 09:39:03 +00:00
david 47bc61d69d Restrict the search path for DLLs to prevent DLL hijacking. If the
SetDllDirectory function is available, as it is on Windows XP SP1 and later,
use it to remove the current directory from the DLL search path. If the
function is not available, call SetCurrentDirectory to the directory containing
the executable.

I believe that such an attack is not currently possible against Nmap, because
it doesn't register any file type associations. This protects us in case such
associations are added in the future.
2010-09-04 04:52:23 +00:00
2010-08-28 16:01:35 +00:00
2010-06-09 17:20:50 +00:00
2010-05-23 17:42:44 +00:00
2010-07-13 07:42:15 +00:00
2010-08-26 02:13:42 +00:00
2008-07-31 14:18:21 +00:00
2010-09-03 18:02:21 +00:00
2010-08-24 01:47:12 +00:00
2010-06-15 18:02:05 +00:00
2010-08-24 01:47:12 +00:00
2010-08-24 01:47:12 +00:00
2010-08-24 01:47:12 +00:00
2010-05-03 21:20:25 +00:00
2010-05-03 21:20:25 +00:00

Here is some documentation for Nmap, but these files are much less
comprehensive than what you'll find at the actual Nmap documentation
site ( http://nmap.org ).
Languages
C 37.5%
Lua 28.1%
C++ 16.8%
Shell 5.8%
Python 4.2%
Other 7.3%