1
0
mirror of https://github.com/nmap/nmap.git synced 2026-01-26 16:19:03 +00:00
paulino 651197768b Adds http-barracuda-dir-traversal -
Attempts to retrieve the configuration settings from the MySQL database 
dump on a Barracuda Networks Spam & Virus Firewall device using the 
directory traversal vulnerability in the "locale" parameter of 
"/cgi-mod/view_help.cgi" or "/cgi-bin/view_help.cgi".

The web administration interface runs on port 8000 by default.

Barracuda Networks Spam & Virus Firewall <= 4.1.1.021 Remote Configuration Retrieval
Original exploit by ShadowHatesYou <Shadow@SquatThis.net>
For more information, see:
http://seclists.org/fulldisclosure/2010/Oct/119
http://www.exploit-db.com/exploits/15130/
2011-06-28 23:43:34 +00:00
2011-06-27 20:08:07 +00:00
2010-05-23 17:42:44 +00:00
2011-05-21 01:30:50 +00:00
2011-01-21 20:59:10 +00:00
2011-06-14 19:46:48 +00:00
2008-07-31 14:18:21 +00:00
2011-06-14 02:29:41 +00:00
2011-06-14 02:29:41 +00:00
2011-06-08 01:24:48 +00:00
2011-06-21 18:05:25 +00:00
2011-06-14 19:46:43 +00:00

Here is some documentation for Nmap, but these files are much less
comprehensive than what you'll find at the actual Nmap documentation
site ( http://nmap.org ).
Languages
C 37.8%
Lua 28.1%
C++ 16.7%
Shell 5.8%
Python 4.2%
Other 7.1%