diff --git a/docs/refguide.xml b/docs/refguide.xml index 77d25b972..255e7a8a6 100644 --- a/docs/refguide.xml +++ b/docs/refguide.xml @@ -3224,7 +3224,7 @@ support the option completely, as does UDP scan. If you wish to see the options in packets sent and received, specify . For more information and examples of using IP options with Nmap, see - . + . diff --git a/ndiff/docs/ndiff.xml b/ndiff/docs/ndiff.xml index afe844999..0ad3b0812 100644 --- a/ndiff/docs/ndiff.xml +++ b/ndiff/docs/ndiff.xml @@ -388,7 +388,7 @@ ln -sf scan-$date.xml scan-prev.xml in Perl and C++, but the summer ended shortly after it was decided to rewrite the program in Python for the sake of Windows (and Zenmap) compatibility. This Python version was written by David - Fifield. James Levine released a Perl script named Ndiff with + Fifield. James Levine released a Perl script named Ndiff with similar functionality in 2000. diff --git a/scripts/http-iis-webdav-vuln.nse b/scripts/http-iis-webdav-vuln.nse index 536e856bd..c8cf5ab65 100644 --- a/scripts/http-iis-webdav-vuln.nse +++ b/scripts/http-iis-webdav-vuln.nse @@ -7,7 +7,7 @@ This script is based on the Metasploit modules/auxiliary/scanner/http/wmap_dir_w For more information on this vulnerability and script, see: * http://blog.zoller.lu/2009/05/iis-6-webdac-auth-bypass-and-data.html -* http://seclists.org/fulldisclosure/2009/May/att-0134/IIS_Advisory_pdf +* http://seclists.org/fulldisclosure/2009/May/att-134/IIS_Advisory_pdf.bin * http://www.skullsecurity.org/blog/?p=271 * http://www.kb.cert.org/vuls/id/787932 * http://www.microsoft.com/technet/security/advisory/971492.mspx diff --git a/scripts/smb-check-vulns.nse b/scripts/smb-check-vulns.nse index 10e7a240c..ebf1c8ce2 100644 --- a/scripts/smb-check-vulns.nse +++ b/scripts/smb-check-vulns.nse @@ -48,7 +48,7 @@ or higher to work. It is considered unsafe. SMBv2 DoS -- performs a denial-of-service against the vulnerability disclosed in CVE-2009-3103. Checks if the server went offline. This works agianst Windows Vista and some versions of Windows 7, and causes a bluescreen if successful. The proof- -of-concept code at was used, +of-concept code at http://seclists.org/fulldisclosure/2009/Sep/39 was used, with one small change. (Note: if you have other SMB/MSRPC vulnerability checks you'd like to see added, and