Hello people, this is a security audit of PHP-4.0.7RC2 (4.0.6 is also available) where you can find : - Potential threats such as buffer Overflows, Race Conditions, Format Strings and Temporary files. - Which functions are dangerous and how to replace them. - Where (files and lines) you can find them. The software behind that audit reads C source code to find selected patterns. It is currently under development. Thanks to Philippe Langlois for providing the audit and code. The results do not mean there *is* a flaw, but that corrections may be implemented to avoid such flaws. http://hellekin.multimania.com/hitscore.php (This is temporary URL. Do not bookmark nor forward). how -- PHP Development Mailing List <http://www.php.net/> To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED] To contact the list administrators, e-mail: [EMAIL PROTECTED]