1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-07 05:01:29 +00:00

Re-indent some scripts. Whitespace-only commit

https://secwiki.org/w/Nmap/Code_Standards
This commit is contained in:
dmiller
2014-01-31 17:36:09 +00:00
parent bcf991c128
commit 298be5bfaa
50 changed files with 3296 additions and 3296 deletions

View File

@@ -135,7 +135,7 @@ function format_output(appdata, mode)
return result return result
end end
action = function(host,port) action = function(host,port)

View File

@@ -108,7 +108,7 @@ action = function(host, port)
state = vulns.STATE.NOT_VULN, state = vulns.STATE.NOT_VULN,
description = description =
[[PHP file inclusion vulnerability in grab_globals.lib.php in phpMyAdmin 2.6.4 and 2.6.4-pl1 allows remote attackers to include local files via the $__redirect parameter, possibly involving the subform array. [[PHP file inclusion vulnerability in grab_globals.lib.php in phpMyAdmin 2.6.4 and 2.6.4-pl1 allows remote attackers to include local files via the $__redirect parameter, possibly involving the subform array.
]], ]],
references = { references = {
'http://www.exploit-db.com/exploits/1244/', 'http://www.exploit-db.com/exploits/1244/',
}, },

View File

@@ -113,10 +113,10 @@ local function go(host, port)
end end
-- Process each of the .vmx files if verbosity is on -- Process each of the .vmx files if verbosity is on
-- if(nmap.verbosity() > 1) then --if(nmap.verbosity() > 1) then
-- local result, file = get_file(host, port, files[1]) -- local result, file = get_file(host, port, files[1])
--io.write(nsedebug.tostr(file)) -- io.write(nsedebug.tostr(file))
-- end --end
return true, files return true, files
end end

View File

@@ -81,7 +81,7 @@ action = function(host,port)
Samba versions 3.6.3 and all versions previous to this are affected by Samba versions 3.6.3 and all versions previous to this are affected by
a vulnerability that allows remote code execution as the "root" user a vulnerability that allows remote code execution as the "root" user
from an anonymous connection. from an anonymous connection.
]], ]],
references = { references = {
'http://www.samba.org/samba/security/CVE-2012-1182', 'http://www.samba.org/samba/security/CVE-2012-1182',
}, },

View File

@@ -116,7 +116,7 @@ The SMB Server in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2,
Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7
does not properly validate fields in an SMB request, which allows remote attackers does not properly validate fields in an SMB request, which allows remote attackers
to execute arbitrary code via a crafted SMB packet, aka "SMB Pool Overflow Vulnerability." to execute arbitrary code via a crafted SMB packet, aka "SMB Pool Overflow Vulnerability."
]], ]],
references = { references = {
'http://seclists.org/fulldisclosure/2010/Aug/122', 'http://seclists.org/fulldisclosure/2010/Aug/122',
'http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2550' 'http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2550'

View File

@@ -94,7 +94,7 @@ action = function(host)
['11111111'] = true, -- BSD/Linux/OSX/ (or not promiscous openwrt ) ['11111111'] = true, -- BSD/Linux/OSX/ (or not promiscous openwrt )
['1_1___1_'] = false, -- WinXP sp2 + pcap|| win98 sniff || win2k sniff (see below) ['1_1___1_'] = false, -- WinXP sp2 + pcap|| win98 sniff || win2k sniff (see below)
['111___1_'] = true, -- WinXP sp2 promisc ['111___1_'] = true, -- WinXP sp2 promisc
-- ['1111__1_'] = true, -- ?Win98 promisc + ??win98 no promisc *not confirmed* --['1111__1_'] = true, -- ?Win98 promisc + ??win98 no promisc *not confirmed*
} }
dnet:ethernet_open(host.interface) dnet:ethernet_open(host.interface)