Result for 7F637C6E55B7E991B5B89240B480C073A2EF2D09

Query result

Key Value
FileNamepolicy-secure.xml
FileSize5816
MD58E4E0DABDB68EE964CF4A7DD9BB3EEF8
RDS:package_id326826
SHA-17F637C6E55B7E991B5B89240B480C073A2EF2D09
SHA-256B794ACDC67A881822B19AB9A9AFAC4EF91E1B89E3857968C31212E1490690173
SSDEEP48:c8hAk71N91FCH9z20fGq3xBpXXzzW6UM29HkjSkCVLsNbbdN75N/d/rIs3YrcBOq:XNfFYz20+KBpHVVwMbx9QGpxvYvgd
TLSHT12CC15315EB0DEC36C08263AB7958A3D4D9A5F4F83758027830EED66073E77A442BB5D4
insert-timestamp1751463625.8685799
sourcemodern.db
hashlookup:parent-total2
hashlookup:trust60

Network graph view

Parents (Total: 2)

The searched file hash is included in 2 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD5C9BA62F55CC496366F5C886DF9A66AF8
PackageArchx86_64
PackageDescriptionThis stringent security policy prioritizes the implementation of rigorous controls and restricted resource utilization to establish a profoundly secure setting while employing ImageMagick. It deactivates conceivably hazardous functionalities, including specific coders like SVG or HTTP. The policy promotes the tailoring of security measures to harmonize with the requirements of the local environment and the guidelines of the organization. This protocol encompasses explicit particulars like limitations on memory consumption, sanctioned pathways for reading and writing, confines on image sequences, the utmost permissible duration of workflows, allocation of disk space intended for image data, and even an undisclosed passphrase for remote connections. By adopting this robust policy, entities can elevate their overall security stance and alleviate potential vulnerabilities.
PackageMaintainerhttps://www.suse.com/
PackageNameImageMagick-config-7-upstream-secure
PackageRelease150600.1.11
PackageVersion7.1.1.21
SHA-1E02AE4F07E3A76CAA4337F7981F60BAB9EA7C366
SHA-25677DA25A40E58B87EE79928FDE6F55EF15F1797FE0FA5CB7C11C4C2D5BC41839A
Key Value
MD5D7D8CDE4907AA3DF84F033B8C200C2E9
PackageArchs390x
PackageDescriptionThis stringent security policy prioritizes the implementation of rigorous controls and restricted resource utilization to establish a profoundly secure setting while employing ImageMagick. It deactivates conceivably hazardous functionalities, including specific coders like SVG or HTTP. The policy promotes the tailoring of security measures to harmonize with the requirements of the local environment and the guidelines of the organization. This protocol encompasses explicit particulars like limitations on memory consumption, sanctioned pathways for reading and writing, confines on image sequences, the utmost permissible duration of workflows, allocation of disk space intended for image data, and even an undisclosed passphrase for remote connections. By adopting this robust policy, entities can elevate their overall security stance and alleviate potential vulnerabilities.
PackageMaintainerhttps://www.suse.com/
PackageNameImageMagick-config-7-upstream-secure
PackageRelease150600.1.11
PackageVersion7.1.1.21
SHA-101F46DB43B7129D03DFB03538EF32A87E3549325
SHA-256F77C90198AB2E335F485BD9211F28C1D518A111DE840D899F9750663F40787F2