mirror of
https://github.com/nmap/nmap.git
synced 2025-12-25 08:59:01 +00:00
Update some SecLists URLs.
This commit is contained in:
@@ -7,7 +7,7 @@ This script is based on the Metasploit modules/auxiliary/scanner/http/wmap_dir_w
|
||||
|
||||
For more information on this vulnerability and script, see:
|
||||
* http://blog.zoller.lu/2009/05/iis-6-webdac-auth-bypass-and-data.html
|
||||
* http://seclists.org/fulldisclosure/2009/May/att-0134/IIS_Advisory_pdf
|
||||
* http://seclists.org/fulldisclosure/2009/May/att-134/IIS_Advisory_pdf.bin
|
||||
* http://www.skullsecurity.org/blog/?p=271
|
||||
* http://www.kb.cert.org/vuls/id/787932
|
||||
* http://www.microsoft.com/technet/security/advisory/971492.mspx
|
||||
|
||||
@@ -48,7 +48,7 @@ or higher to work. It is considered <code>unsafe</code>.
|
||||
SMBv2 DoS -- performs a denial-of-service against the vulnerability disclosed in
|
||||
CVE-2009-3103. Checks if the server went offline. This works agianst Windows Vista
|
||||
and some versions of Windows 7, and causes a bluescreen if successful. The proof-
|
||||
of-concept code at <http://seclists.org/fulldisclosure/2009/Sep/0039.html> was used,
|
||||
of-concept code at http://seclists.org/fulldisclosure/2009/Sep/39 was used,
|
||||
with one small change.
|
||||
|
||||
(Note: if you have other SMB/MSRPC vulnerability checks you'd like to see added, and
|
||||
|
||||
Reference in New Issue
Block a user