1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-06 04:31:29 +00:00
Commit Graph

12 Commits

Author SHA1 Message Date
dmiller
0500811f5a Move string utility functions to stringaux.lua 2018-10-18 01:08:19 +00:00
dmiller
856b90337a Document some undocumented script-args. 2015-11-25 03:01:29 +00:00
dmiller
f4619edece Update http urls for nmap.org to https 2015-11-05 20:41:05 +00:00
dmiller
298be5bfaa Re-indent some scripts. Whitespace-only commit
https://secwiki.org/w/Nmap/Code_Standards
2014-01-31 17:36:09 +00:00
dmiller
620f9fdb34 Remove trailing whitespace in lua files
Whitespace is not significant, so this should not be a problem.
https://secwiki.org/w/Nmap/Code_Standards
2014-01-23 21:51:58 +00:00
fyodor
f79a11aeeb o [NSE] Oops, there was a vulnerability in one of our 437 NSE scripts.
If you ran the (fortunately non-default) http-domino-enum-passwords
  script with the (fortunately also non-default)
  domino-enum-passwords.idpath parameter against a malicious server,
  it could cause an arbitrarily named file to to be written to the
  client system.  Thanks to Trustwave researcher Piotr Duszynski for
  discovering and reporting the problem.  We've fixed that script, and
  also updated several other scripts to use a new
  stdnse.filename_escape function for extra safety.  This breaks our
  record of never having a vulnerability in the 16 years that Nmap has
  existed, but that's still a fairly good run. [David, Fyodor]
2013-07-29 06:19:24 +00:00
batrick
000f6dc4d9 Lua 5.2 upgrade [1] for NSE.
[1] http://seclists.org/nmap-dev/2012/q2/34
2012-05-27 08:53:32 +00:00
patrik
631515a5ed Removed dependency of non-existing ms-sql-discover script reported by
Tom Sellers.
2012-02-12 15:49:24 +00:00
fyodor
78033599ed Update the script descriptions/nsedoc a bit 2012-01-01 22:21:08 +00:00
fyodor
f73e2b27d1 Update and canonicalize a bunch of script descriptions 2011-11-07 04:08:29 +00:00
david
9b73f3742c Put ms-sql-dump-hashes in "auth". 2011-10-11 20:36:12 +00:00
patrik
46f499d78f o [NSE] Added ms-sql-dump-hashes, a script that dumps the MS SQL hashes in a
format suitable for offline cracking. [Patrik]
2011-10-11 06:03:45 +00:00