Daiyuu Nobori
b59697fbd4
Merge pull request #510 from dnobori/b3_loadlibrary
...
Preventing the Win32 API LoadLibrary() current directory DLL injection issue.
2018-05-24 18:07:53 +09:00
Josh Soref
ac865f04fc
Correct Spelling ( #458 )
...
* spelling: accepts
* spelling: account
* spelling: accept
* spelling: accumulate
* spelling: adapter
* spelling: address
* spelling: additional
* spelling: aggressive
* spelling: adhered
* spelling: allowed
* spelling: ambiguous
* spelling: amount
* spelling: anonymous
* spelling: acquisition
* spelling: assemble
* spelling: associated
* spelling: assigns
* spelling: attach
* spelling: attempt
* spelling: attribute
* spelling: authenticate
* spelling: authentication
* spelling: available
* spelling: bridging
* spelling: cascade
* spelling: cancel
* spelling: check
* spelling: challenge
* spelling: changing
* spelling: characters
* spelling: cloud
* spelling: compare
* spelling: communication
* spelling: compatible
* spelling: compatibility
* spelling: completion
* spelling: complete
* spelling: computers
* spelling: configure
* spelling: configuration
* spelling: conformant
* spelling: connection
* spelling: contains
* spelling: continuously
* spelling: continue
* spelling: convert
* spelling: counters
* spelling: create
* spelling: created
* spelling: cumulate
* spelling: currently
* spelling: debugging
* spelling: decryption
* spelling: description
* spelling: default
* spelling: driver
* spelling: delete
* spelling: destination
* spelling: disabled
* spelling: different
* spelling: dynamically
* spelling: directory
* spelling: disappeared
* spelling: disable
* spelling: doesn't
* spelling: download
* spelling: dropped
* spelling: enable
* spelling: established
* spelling: ether
* spelling: except
* spelling: expired
* spelling: field
* spelling: following
* spelling: forever
* spelling: firewall
* spelling: first
* spelling: fragment
* spelling: function
* spelling: gateway
* spelling: identifier
* spelling: identify
* spelling: incoming
* spelling: information
* spelling: initialize
* spelling: injection
* spelling: inner
* spelling: instead
* spelling: installation
* spelling: inserted
* spelling: integer
* spelling: interrupt
* spelling: intuitive
* spelling: interval
* spelling: january
* spelling: keybytes
* spelling: know
* spelling: language
* spelling: length
* spelling: library
* spelling: listener
* spelling: maintain
* spelling: modified
* spelling: necessary
* spelling: number
* spelling: obsoleted
* spelling: occurred
* spelling: occurring
* spelling: occur
* spelling: original
* spelling: omittable
* spelling: omit
* spelling: opening
* spelling: operation
* spelling: packet
* spelling: parameters
* spelling: pointed
* spelling: popupmenuopen
* spelling: privilege
* spelling: product
* spelling: protection
* spelling: promiscuous
* spelling: prompt
* spelling: query
* spelling: random
* spelling: reconnection
* spelling: revocation
* spelling: received
* spelling: red hat
* spelling: registry
* spelling: release
* spelling: retrieve
2018-05-16 23:47:10 +02:00
Daiyuu Nobori
241813e827
Preventing the Win32 API LoadLibrary() current directory DLL injection issue.
...
When loading the DLL file by the LoadLibrary() function in Windows VPN programs, we changed the behavior not to search the current directory. Based on this improvement, even if there are untrusted DLL files in the calendar directory, it is now safe to avoid the problem of unexpected security problem caused by the default loading behavior of Windows. Acknowledgments: This is based on a report by Herman Groeneveld, aka Sh4d0wman.
2018-04-22 18:35:38 +09:00
Daiyuu Nobori
9f9dc459a7
Preparing the development branch
2017-10-19 15:00:41 +09:00
dnobori
faee11ff09
v4.23-9647-beta
2017-10-18 18:24:21 +09:00
dnobori
17e624ac26
v4.19-9605-beta
2016-03-06 23:16:01 +09:00
dnobori
860f743dd7
v4.17-9566-beta
2015-07-17 00:31:57 +09:00
dnobori
9f7d8578a7
v4.10-9472-beta
2014-07-12 02:06:20 +09:00
dnobori
cf2a6a42bc
v4.06-9430-beta
2014-03-20 05:45:05 +09:00
dnobori
001fd910fe
v4.04-9412-rtm
2014-01-15 18:01:42 +09:00
dnobori
749497dde0
v4.03-9408-rtm
2014-01-04 22:00:08 +09:00