webbufferoverflowvulnerable.xml.local

来自「The Network Security Response Framework 」· LOCAL 代码 · 共 11 行

LOCAL
11
字号
<?xml version="1.0" encoding="UTF-8"?><WormProfile xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="file:///home/kelek/wormsim/xml/wormProfile.xsd" filesystem="web" vulnerable="yes" stopUnit="infections" service="webserver">	<name>WebBufferOverflow</name>	<stopValue>30</stopValue>	<Requirement>		<EventClass alpha="0" isresponse="0" id="0" name="Apache">			<Field name="Version" type="float" floatval="1.3" set="1"></Field>		</EventClass>	</Requirement></WormProfile>

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?