Hello people,

this is a security audit of PHP-4.0.7RC2 (4.0.6 is also available) where 
you can find :

        - Potential threats such as buffer Overflows, Race Conditions, Format 
Strings and Temporary files.
        - Which functions are dangerous and how to replace them.
        - Where (files and lines) you can find them.

The software behind that audit reads C source code to find selected patterns.
It is currently under development. Thanks to Philippe Langlois for 
providing the audit and code.
The results do not mean there *is* a flaw, but that corrections may be 
implemented to avoid such flaws.

http://hellekin.multimania.com/hitscore.php

(This is temporary URL. Do not bookmark nor forward).

how


-- 
PHP Development Mailing List <http://www.php.net/>
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]
To contact the list administrators, e-mail: [EMAIL PROTECTED]

Reply via email to