mirror of
https://github.com/nmap/nmap.git
synced 2026-02-06 21:46:34 +00:00
785855e3acb475d964c9ce3d118716338b73d2b3
At high scan rates, there was nothing to prevent trying to set or clear socket descriptors above FD_SETSIZE, which is usually around 1024. I got a reliable assertion failures with the command nmap -sT -p- --min-rate 100000 scanme.nmap.org The problem only affected -sT scans. A similar protection was added to Nsock in r15808.
Here is some documentation for Nmap, but these files are much less comprehensive than what you'll find at the actual Nmap documentation site ( http://nmap.org ).
Description
Languages
C
37.5%
Lua
28.1%
C++
16.8%
Shell
5.8%
Python
4.2%
Other
7.3%