webbufferoverflowvulnerable.xml.emulab
来自「The Network Security Response Framework 」· EMULAB 代码 · 共 11 行
EMULAB
11 行
<?xml version="1.0" encoding="UTF-8"?><WormProfile xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="file:///home/kelek/wormsim/xml/wormProfile.xsd" filesystem="web" vulnerable="yes" stopUnit="infections" service="webserver"> <name>WebBufferOverflow</name> <stopValue>30</stopValue> <Requirement> <EventClass alpha="0" isresponse="0" id="0" name="Apache"> <Field name="Version" type="float" floatval="1.3" set="1"></Field> </EventClass> </Requirement></WormProfile>
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?