mirror of
https://github.com/nmap/nmap.git
synced 2025-12-07 05:01:29 +00:00
Re-indent some scripts. Whitespace-only commit
https://secwiki.org/w/Nmap/Code_Standards
This commit is contained in:
@@ -135,7 +135,7 @@ function format_output(appdata, mode)
|
|||||||
|
|
||||||
return result
|
return result
|
||||||
|
|
||||||
end
|
end
|
||||||
|
|
||||||
|
|
||||||
action = function(host,port)
|
action = function(host,port)
|
||||||
|
|||||||
@@ -108,7 +108,7 @@ action = function(host, port)
|
|||||||
state = vulns.STATE.NOT_VULN,
|
state = vulns.STATE.NOT_VULN,
|
||||||
description =
|
description =
|
||||||
[[PHP file inclusion vulnerability in grab_globals.lib.php in phpMyAdmin 2.6.4 and 2.6.4-pl1 allows remote attackers to include local files via the $__redirect parameter, possibly involving the subform array.
|
[[PHP file inclusion vulnerability in grab_globals.lib.php in phpMyAdmin 2.6.4 and 2.6.4-pl1 allows remote attackers to include local files via the $__redirect parameter, possibly involving the subform array.
|
||||||
]],
|
]],
|
||||||
references = {
|
references = {
|
||||||
'http://www.exploit-db.com/exploits/1244/',
|
'http://www.exploit-db.com/exploits/1244/',
|
||||||
},
|
},
|
||||||
|
|||||||
@@ -113,10 +113,10 @@ local function go(host, port)
|
|||||||
end
|
end
|
||||||
|
|
||||||
-- Process each of the .vmx files if verbosity is on
|
-- Process each of the .vmx files if verbosity is on
|
||||||
-- if(nmap.verbosity() > 1) then
|
--if(nmap.verbosity() > 1) then
|
||||||
-- local result, file = get_file(host, port, files[1])
|
-- local result, file = get_file(host, port, files[1])
|
||||||
--io.write(nsedebug.tostr(file))
|
-- io.write(nsedebug.tostr(file))
|
||||||
-- end
|
--end
|
||||||
|
|
||||||
return true, files
|
return true, files
|
||||||
end
|
end
|
||||||
|
|||||||
@@ -81,7 +81,7 @@ action = function(host,port)
|
|||||||
Samba versions 3.6.3 and all versions previous to this are affected by
|
Samba versions 3.6.3 and all versions previous to this are affected by
|
||||||
a vulnerability that allows remote code execution as the "root" user
|
a vulnerability that allows remote code execution as the "root" user
|
||||||
from an anonymous connection.
|
from an anonymous connection.
|
||||||
]],
|
]],
|
||||||
references = {
|
references = {
|
||||||
'http://www.samba.org/samba/security/CVE-2012-1182',
|
'http://www.samba.org/samba/security/CVE-2012-1182',
|
||||||
},
|
},
|
||||||
|
|||||||
@@ -116,7 +116,7 @@ The SMB Server in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2,
|
|||||||
Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7
|
Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7
|
||||||
does not properly validate fields in an SMB request, which allows remote attackers
|
does not properly validate fields in an SMB request, which allows remote attackers
|
||||||
to execute arbitrary code via a crafted SMB packet, aka "SMB Pool Overflow Vulnerability."
|
to execute arbitrary code via a crafted SMB packet, aka "SMB Pool Overflow Vulnerability."
|
||||||
]],
|
]],
|
||||||
references = {
|
references = {
|
||||||
'http://seclists.org/fulldisclosure/2010/Aug/122',
|
'http://seclists.org/fulldisclosure/2010/Aug/122',
|
||||||
'http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2550'
|
'http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2550'
|
||||||
|
|||||||
@@ -94,7 +94,7 @@ action = function(host)
|
|||||||
['11111111'] = true, -- BSD/Linux/OSX/ (or not promiscous openwrt )
|
['11111111'] = true, -- BSD/Linux/OSX/ (or not promiscous openwrt )
|
||||||
['1_1___1_'] = false, -- WinXP sp2 + pcap|| win98 sniff || win2k sniff (see below)
|
['1_1___1_'] = false, -- WinXP sp2 + pcap|| win98 sniff || win2k sniff (see below)
|
||||||
['111___1_'] = true, -- WinXP sp2 promisc
|
['111___1_'] = true, -- WinXP sp2 promisc
|
||||||
-- ['1111__1_'] = true, -- ?Win98 promisc + ??win98 no promisc *not confirmed*
|
--['1111__1_'] = true, -- ?Win98 promisc + ??win98 no promisc *not confirmed*
|
||||||
}
|
}
|
||||||
dnet:ethernet_open(host.interface)
|
dnet:ethernet_open(host.interface)
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user