1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-07 21:21:31 +00:00
Commit Graph

18 Commits

Author SHA1 Message Date
ron
13bb98b8b8 Bring in changes from my experimental brange, nmap-http 2010-10-27 03:08:08 +00:00
david
a9b75892f5 Use shortport.http where appropriate. 2010-08-09 22:30:50 +00:00
david
bccb8ead89 Edit some script descriptions for better line breaks when rendered as
PDF. Some long URLs were replaced by short redirects under
http://nmap.org/r/.
2010-07-17 16:47:31 +00:00
david
b9633ed69b Do copyediting of NSEDoc. This is a first pass up to ms-sql-xp-cmdshell. 2010-07-09 23:32:18 +00:00
david
752fd5331b Use http.generic_request in http-iis-webdav-vuln.nse. 2010-02-19 05:03:00 +00:00
david
a3a7d79b5f Update some SecLists URLs. 2010-02-11 17:43:02 +00:00
david
ba5f5644cb Remove some non-NSEDoc markup that was breaking a link. 2010-02-11 05:05:44 +00:00
ron
96a390203c Updated http-iis-webdav-vuln.nse to run against SSL-enabled servers 2009-12-08 17:29:43 +00:00
fyodor
77ab5c4305 Remove email addresses from scripts as discussed in this thread: http://seclists.org/nmap-dev/2009/q4/466 2009-11-24 08:49:02 +00:00
ron
7604ec68e2 Updated http-iis-webdav-vuln.nse: gives less output by default (unless -v or -d is given). Also updated it to reflect Microsoft's MS09-020 bulletin. 2009-06-11 21:57:42 +00:00
ron
ab59b09c03 Miscellaneous code cleanups in my smb-* libraries/scripts (removed unused includes, old debug code, etc.) 2009-06-10 23:13:15 +00:00
fyodor
d971be11a8 Add links to some other sources of information on the vulnerability and this script 2009-05-22 19:59:07 +00:00
ron
bfd3c5b3df Fixed the 'usage' section -- thanks to Raul Siles for pointing out the mistake 2009-05-22 12:35:59 +00:00
ron
db4b1df6d1 Fixed a nil-reference bug in the WebDAV code 2009-05-21 19:49:53 +00:00
ron
4d38f8c8c5 Fixed a spelling mistake on print_debug ('pring_debug') 2009-05-21 14:35:23 +00:00
ron
9f21ec234c Applied a patch to WebDAV checks created by Andrew Orr:
1) Checks if the root folder is protected and aborts if it is (we can't scan folders if the root folder is protected)
2) Checks if WebDAV is enabled on the server and aborts if it isn't. The check works on IIS 5, 5.1, and 6.0 (hasn't been tested on others)
3) Added support for finding the vulnerability on IIS 5.1 (Windows XP) -- 5.0 doesn't appear to be vulnerable in our tests
2009-05-20 18:44:01 +00:00
fyodor
d3e623bf00 change the categories to vuln and intrusive 2009-05-20 00:51:54 +00:00
fyodor
4599d9f4f5 rename http-webdav-unicode-bypass.nse to http-iis-webdav-vuln.nse and update script.db 2009-05-20 00:43:30 +00:00