You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Included Detour Express(build 316) library is vulnurable.
Detours 4.0.1 is now open source under the MIT license. Detours is on GitHub at https://github.com/Microsoft/Detours. The source code is identical to Build 343 of Detours 3.0. Detours Build 338 and later fix a security vulnerability that has been identified in releases of Detours before 3.0 Build 334.
Detours 4.0.1 supports x86, x64 and other Windows-compatible processors (IA64 and ARM). It includes support for either 32-bit or 64-bit processes.
The text was updated successfully, but these errors were encountered:
This project shouldn't be viewed as a secure program, it is a research tool. There is zero memory corruption testing, and probably many more numerous security vulnerabilities in it than just the Detours library.
It can be good to include a new version of Detours though for the extra functionality, and I'd be willing to accept a pull request for that addition.
Included Detour Express(build 316) library is vulnurable.
Detours 4.0.1 is now open source under the MIT license. Detours is on GitHub at https://github.com/Microsoft/Detours. The source code is identical to Build 343 of Detours 3.0. Detours Build 338 and later fix a security vulnerability that has been identified in releases of Detours before 3.0 Build 334.
Detours 4.0.1 supports x86, x64 and other Windows-compatible processors (IA64 and ARM). It includes support for either 32-bit or 64-bit processes.
The text was updated successfully, but these errors were encountered: