mirror of
https://github.com/nmap/nmap.git
synced 2025-12-25 00:49:01 +00:00
SetDllDirectory function is available, as it is on Windows XP SP1 and later, use it to remove the current directory from the DLL search path. If the function is not available, call SetCurrentDirectory to the directory containing the executable. I believe that such an attack is not currently possible against Nmap, because it doesn't register any file type associations. This protects us in case such associations are added in the future.
12 KiB
12 KiB