mirror of
https://github.com/nmap/nmap.git
synced 2025-12-09 14:11:29 +00:00
Squashed commit of the following:
commit a78b6142449b71ccd1cd7061b5363f6882b2e00b Author: Patrik Karlsson <patrik@cqure.net> Date: Sun May 25 21:19:22 2014 -0400 fix indentation commit 5e61eba30f98343fb172687bd377acae6cb9e242 Merge: d446fa7 9696dd5 Author: Patrik Karlsson <patrik@cqure.net> Date: Sun May 25 21:15:50 2014 -0400 Merge branch 'master' into anyconnect commit d446fa76181d97287604b48719dd3f714987b775 Author: Patrik Karlsson <patrik@cqure.net> Date: Sun May 25 21:15:09 2014 -0400 Update CHANGELOG commit 1590b8a8598bfd06c767c31312dc56c8e306c556 Author: Patrik Karlsson <patrik@cqure.net> Date: Sun May 25 21:13:27 2014 -0400 update script.db commit 93eb927e21d3e3702da36668628b70c42f14f0db Author: Patrik Karlsson <patrik@cqure.net> Date: Sun May 25 21:09:51 2014 -0400 update anyconnect library to better capture version add missing libraries http-cisco-anyconnect.nse add new scripts to detect vulnerabilities cve2014-2126 through 2129 commit 92fecad07d340e60abbe502a4541d6e4f71af224 Author: Patrik Karlsson <patrik@cqure.net> Date: Sat May 24 09:09:14 2014 -0400 initial commit
This commit is contained in:
@@ -144,6 +144,7 @@ Entry { filename = "http-barracuda-dir-traversal.nse", categories = { "auth", "e
|
||||
Entry { filename = "http-brute.nse", categories = { "brute", "intrusive", } }
|
||||
Entry { filename = "http-cakephp-version.nse", categories = { "discovery", "safe", } }
|
||||
Entry { filename = "http-chrono.nse", categories = { "discovery", "intrusive", } }
|
||||
Entry { filename = "http-cisco-anyconnect.nse", categories = { "default", "discovery", "safe", } }
|
||||
Entry { filename = "http-coldfusion-subzero.nse", categories = { "exploit", } }
|
||||
Entry { filename = "http-comments-displayer.nse", categories = { "discovery", "safe", } }
|
||||
Entry { filename = "http-config-backup.nse", categories = { "auth", "intrusive", } }
|
||||
@@ -226,6 +227,10 @@ Entry { filename = "http-vuln-cve2011-3368.nse", categories = { "intrusive", "vu
|
||||
Entry { filename = "http-vuln-cve2012-1823.nse", categories = { "exploit", "intrusive", "vuln", } }
|
||||
Entry { filename = "http-vuln-cve2013-0156.nse", categories = { "exploit", "vuln", } }
|
||||
Entry { filename = "http-vuln-cve2013-7091.nse", categories = { "exploit", "intrusive", "vuln", } }
|
||||
Entry { filename = "http-vuln-cve2014-2126.nse", categories = { "safe", "vuln", } }
|
||||
Entry { filename = "http-vuln-cve2014-2127.nse", categories = { "safe", "vuln", } }
|
||||
Entry { filename = "http-vuln-cve2014-2128.nse", categories = { "safe", "vuln", } }
|
||||
Entry { filename = "http-vuln-cve2014-2129.nse", categories = { "safe", "vuln", } }
|
||||
Entry { filename = "http-vuln-wnr1000-creds.nse", categories = { "exploit", "intrusive", "vuln", } }
|
||||
Entry { filename = "http-waf-detect.nse", categories = { "discovery", "intrusive", } }
|
||||
Entry { filename = "http-waf-fingerprint.nse", categories = { "discovery", "intrusive", } }
|
||||
|
||||
Reference in New Issue
Block a user