diff --git a/scripts/realvnc-auth-bypass.nse b/scripts/realvnc-auth-bypass.nse index b94f86263..d8d3025ec 100644 --- a/scripts/realvnc-auth-bypass.nse +++ b/scripts/realvnc-auth-bypass.nse @@ -5,6 +5,12 @@ Checks if a VNC server is vulnerable to the RealVNC authentication bypass author = "Brandon Enright" license = "Same as Nmap--See http://nmap.org/book/man-legal.html" +--- +-- @output +-- PORT STATE SERVICE VERSION +-- 5900/tcp open vnc VNC (protocol 3.8) +-- |_realvnc-auth-bypass: Vulnerable + categories = {"default", "vuln", "safe"} require "shortport" diff --git a/scripts/sql-injection.nse b/scripts/sql-injection.nse index 1a2400bfd..d458e3b80 100644 --- a/scripts/sql-injection.nse +++ b/scripts/sql-injection.nse @@ -26,6 +26,18 @@ author = "Eddie Bell" license = "Same as Nmap--See http://nmap.org/book/man-legal.html" categories = {"intrusive", "vuln"} +--- +-- @args sql-injection.start The path at which to start spidering; default /. +-- @args sql-injection.maxdepth The maximum depth to spider; default 10. +-- +-- @output +-- PORT STATE SERVICE +-- 80/tcp open http +-- | sql-injection: Host might be vulnerable +-- | /a_index.php?id_str=1'%20OR%20sqlspider +-- | /a_index.php?id_str=1'%20OR%20sqlspider +-- | /a_index.php?id_str=2'%20OR%20sqlspider + -- Change this to increase depth of crawl local maxdepth = 10 local get_page_from_host