mirror of
https://github.com/nmap/nmap.git
synced 2025-12-06 04:31:29 +00:00
Re-indent some scripts. Whitespace-only commit
https://secwiki.org/w/Nmap/Code_Standards
This commit is contained in:
@@ -135,7 +135,7 @@ function format_output(appdata, mode)
|
||||
|
||||
return result
|
||||
|
||||
end
|
||||
end
|
||||
|
||||
|
||||
action = function(host,port)
|
||||
|
||||
@@ -108,7 +108,7 @@ action = function(host, port)
|
||||
state = vulns.STATE.NOT_VULN,
|
||||
description =
|
||||
[[PHP file inclusion vulnerability in grab_globals.lib.php in phpMyAdmin 2.6.4 and 2.6.4-pl1 allows remote attackers to include local files via the $__redirect parameter, possibly involving the subform array.
|
||||
]],
|
||||
]],
|
||||
references = {
|
||||
'http://www.exploit-db.com/exploits/1244/',
|
||||
},
|
||||
|
||||
@@ -113,10 +113,10 @@ local function go(host, port)
|
||||
end
|
||||
|
||||
-- Process each of the .vmx files if verbosity is on
|
||||
-- if(nmap.verbosity() > 1) then
|
||||
-- local result, file = get_file(host, port, files[1])
|
||||
--io.write(nsedebug.tostr(file))
|
||||
-- end
|
||||
--if(nmap.verbosity() > 1) then
|
||||
-- local result, file = get_file(host, port, files[1])
|
||||
-- io.write(nsedebug.tostr(file))
|
||||
--end
|
||||
|
||||
return true, files
|
||||
end
|
||||
|
||||
@@ -81,7 +81,7 @@ action = function(host,port)
|
||||
Samba versions 3.6.3 and all versions previous to this are affected by
|
||||
a vulnerability that allows remote code execution as the "root" user
|
||||
from an anonymous connection.
|
||||
]],
|
||||
]],
|
||||
references = {
|
||||
'http://www.samba.org/samba/security/CVE-2012-1182',
|
||||
},
|
||||
|
||||
@@ -116,7 +116,7 @@ The SMB Server in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2,
|
||||
Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7
|
||||
does not properly validate fields in an SMB request, which allows remote attackers
|
||||
to execute arbitrary code via a crafted SMB packet, aka "SMB Pool Overflow Vulnerability."
|
||||
]],
|
||||
]],
|
||||
references = {
|
||||
'http://seclists.org/fulldisclosure/2010/Aug/122',
|
||||
'http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2550'
|
||||
|
||||
@@ -94,7 +94,7 @@ action = function(host)
|
||||
['11111111'] = true, -- BSD/Linux/OSX/ (or not promiscous openwrt )
|
||||
['1_1___1_'] = false, -- WinXP sp2 + pcap|| win98 sniff || win2k sniff (see below)
|
||||
['111___1_'] = true, -- WinXP sp2 promisc
|
||||
-- ['1111__1_'] = true, -- ?Win98 promisc + ??win98 no promisc *not confirmed*
|
||||
--['1111__1_'] = true, -- ?Win98 promisc + ??win98 no promisc *not confirmed*
|
||||
}
|
||||
dnet:ethernet_open(host.interface)
|
||||
|
||||
|
||||
Reference in New Issue
Block a user