Twenty Year Anniversary
Showing 1 - 11 of 11 RSS Feed

Files from David A. Wheeler

Email addressdwheeler at dwheeler.com
First Active2000-01-12
Last Active2018-04-04
Flawfinder 2.0.6
Posted Apr 4, 2018
Authored by David A. Wheeler | Site sourceforge.net

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function.

Changes: Small fixes. Updated cwe.mitre.org URLs to use https.
tags | tool
systems | unix
MD5 | ba8ad461c8b30c04dcade87f6c1857cf
Flawfinder 2.0.5
Posted Nov 17, 2017
Authored by David A. Wheeler | Site sourceforge.net

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function.

Changes: Added detection of crypt_r function. Added detection of errant equal, mismatch, and is_permutation. Updated CWE, risk, and discussion for C++14 STL functions. Fixed hit count reporting. Updated www.dwheeler.com URLs to use https.
tags | tool
systems | unix
MD5 | e7b9a9c35661007fe5a9cb6aea8c865f
Flawfinder 2.0.4
Posted Sep 4, 2017
Authored by David A. Wheeler | Site sourceforge.net

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function.

Changes: Now directly supports pip installs. Switched from distutils to setuptools.
tags | tool
systems | unix
MD5 | 60f3a87102de4acdb79116ad9a744bec
Flawfinder 2.0.2
Posted Aug 28, 2017
Authored by David A. Wheeler | Site sourceforge.net

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function.

Changes: Flawfinder can now run on either Python 2.7 or 3. Added more tests. Implemented additional code cleanups recommended by Pylint. Modified documentation in various ways to clarify things.
tags | tool
systems | unix
MD5 | c9ce3115093bc3b8754b82603c8b2848
Flawfinder 1.31
Posted Aug 12, 2014
Authored by David A. Wheeler | Site sourceforge.net

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function.

Changes: Various updates.
tags | tool
systems | unix
MD5 | 27f534e527db3eeef827c9a1b0d755c2
flawfinder-1.27.tar.gz
Posted Jan 20, 2007
Authored by David A. Wheeler | Site dwheeler.com

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function. Secure Programming HOWTO here.

Changes: Added various support, feature enhancements, and bug fixes.
systems | unix
MD5 | 50fff67dd439f42b785577ed8b3a3f7d
flawfinder-1.26.tar.gz
Posted Jun 18, 2004
Authored by David A. Wheeler | Site dwheeler.com

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function. Secure Programming HOWTO here.

Changes: Added various support, feature enhancements, and bug fixes.
systems | unix
MD5 | 242a90ecf2f21a709a2425c8771ef38e
flawfinder-1.25.tar.gz
Posted Jun 2, 2004
Authored by David A. Wheeler | Site dwheeler.com

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function. Secure Programming HOWTO here.

Changes: Output format, packaging, and many feature enhancements.
systems | unix
MD5 | fa5b644e00aa4862de5b790f0e1a3ad7
flawfinder-1.22.tar.gz
Posted Apr 10, 2003
Authored by David A. Wheeler | Site dwheeler.com

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function. Secure Programming HOWTO here.

Changes: Output format and packaging.
systems | unix
MD5 | a6746b5e8b443e777ebd223edae33e6d
flawfinder-1.21.tar.gz
Posted Oct 17, 2002
Authored by David A. Wheeler | Site dwheeler.com

Flawfinder searches through source code for potential security flaws, listing potential security flaws sorted by risk, with the most potentially dangerous flaws shown first. This risk level depends not only on the function, but on the values of the parameters of the function. Secure Programming HOWTO here.

Changes: Improved the default output, added a short tutorial to man page, fixed some bugs.
systems | unix
MD5 | 4f9a408b0c73d911bc4771b3c45ac9da
Secure-Programs-HOWTO.htm
Posted Jan 12, 2000
Authored by David A. Wheeler

Secure Programming Howto - This paper provides a set of design and implementation guidelines for writing secure programs for Linux systems. Such programs include application programs used as viewers of remote data, CGI scripts, network servers, and setuid/setgid programs.

tags | paper, remote, cgi
systems | linux
MD5 | 24859d444efc55ac3c4fe643fd1ff557
Page 1 of 1
Back1Next

File Archive:

November 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    10 Files
  • 2
    Nov 2nd
    15 Files
  • 3
    Nov 3rd
    2 Files
  • 4
    Nov 4th
    2 Files
  • 5
    Nov 5th
    32 Files
  • 6
    Nov 6th
    27 Files
  • 7
    Nov 7th
    8 Files
  • 8
    Nov 8th
    9 Files
  • 9
    Nov 9th
    17 Files
  • 10
    Nov 10th
    2 Files
  • 11
    Nov 11th
    2 Files
  • 12
    Nov 12th
    33 Files
  • 13
    Nov 13th
    29 Files
  • 14
    Nov 14th
    23 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close