1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-20 22:49:01 +00:00
Files
nmap/mswin32
david 47bc61d69d Restrict the search path for DLLs to prevent DLL hijacking. If the
SetDllDirectory function is available, as it is on Windows XP SP1 and later,
use it to remove the current directory from the DLL search path. If the
function is not available, call SetCurrentDirectory to the directory containing
the executable.

I believe that such an attack is not currently possible against Nmap, because
it doesn't register any file type associations. This protects us in case such
associations are added in the future.
2010-09-04 04:52:23 +00:00
..
2005-04-11 22:34:19 +00:00
2005-04-11 22:34:19 +00:00
2005-04-11 22:34:19 +00:00
2005-08-24 19:22:11 +00:00
2005-08-08 05:48:49 +00:00
2009-05-25 01:49:27 +00:00