Result for C87E9C8EE52FCC93F358C880009F1D6562B15987

Query result

Key Value
FileName./usr/share/php/Zend/Permissions/Acl/Exception/InvalidArgumentException.php
FileSize455
MD59F8DFCF221A542C22A76A99840F51D6F
SHA-1C87E9C8EE52FCC93F358C880009F1D6562B15987
SHA-256AC1CF5D28632BE036F902144627698DC50321F17299FA2BFA49C569D51976544
SSDEEP6:/6LvS2NblKXHL64LiEUyXLDK8KUH/vaPsxK4o5A/lKXHL2RyxQuAJTYdBcQBSWH3:yzNNMZiEUKK8h+sRMUyxQuAJGBhBlH8I
TLSHT13FF05C8F1418112B5BAB9D87B4F9450BC0F35280B1CB088FF015864877F4CB61582B1B
hashlookup:parent-total2
hashlookup:trust60

Network graph view

Parents (Total: 2)

The searched file hash is included in 2 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
MD51F0AB61699165E80265E8398135E1DD0
PackageArchnoarch
PackageDescriptionThe Zend\Permissions\Acl component provides a lightweight and flexible access control list (ACL) implementation for privileges management. In general, an application may utilize such ACL‘s to control access to certain protected objects by other requesting objects. For the purposes of this documentation: * a resource is an object to which access is controlled. * a role is an object that may request access to a Resource. Put simply, roles request access to resources. For example, if a parking attendant requests access to a car, then the parking attendant is the requesting role, and the car is the resource, since access to the car may not be granted to everyone. Through the specification and use of an ACL, an application may control how roles are granted access to resources.
PackageMaintainerFedora Project
PackageNamephp-ZendFramework2-Permissions-Acl
PackageRelease2.fc20
PackageVersion2.2.5
SHA-1073A717279BD52B9B1FEE7C46838936398A113F5
SHA-2563F1A3C6CE67DE592E672C9A06DD4C13A4A69B445DE9B8BFF5E3629EC759C806C
Key Value
MD537547321590AB4A48F5D33F19755365B
PackageArchnoarch
PackageDescriptionThe Zend\Permissions\Acl component provides a lightweight and flexible access control list (ACL) implementation for privileges management. In general, an application may utilize such ACL‘s to control access to certain protected objects by other requesting objects. For the purposes of this documentation: * a resource is an object to which access is controlled. * a role is an object that may request access to a Resource. Put simply, roles request access to resources. For example, if a parking attendant requests access to a car, then the parking attendant is the requesting role, and the car is the resource, since access to the car may not be granted to everyone. Through the specification and use of an ACL, an application may control how roles are granted access to resources.
PackageMaintainerFedora Project
PackageNamephp-ZendFramework2-Permissions-Acl
PackageRelease2.fc20
PackageVersion2.2.5
SHA-1B624AA8DB0130D32AC7F42CAC742781D2D4D3B2A
SHA-256A3115E8913E34FA09E8824DD1153B9D36A9830996B43404BB371BFF30270D1B1