monkeyweb_too_big_post.nasl

来自「漏洞扫描源码,可以扫描linux,windows,交换机路由器」· NASL 代码 · 共 42 行

NASL
42
字号
## This script was written by Michel Arboi <arboi@alussinan.org>## GNU Public Licence## Ref:# From: "Matthew Murphy" <mattmurphy@kc.rr.com># To: "BugTraq" <bugtraq@securityfocus.com># Subject: Monkey HTTPd Remote Buffer Overflow# Date: Sun, 20 Apr 2003 16:34:03 -0500if(description){ script_id(11544); script_cve_id("CVE-2003-0218"); script_bugtraq_id(7202); script_version ("$Revision: 38 $");  name["english"] = "MonkeyWeb POST with too much data"; script_name(english:name["english"]);  desc["english"] = "Your web server crashes when it receives a POST commandwith too much data.It *may* even be possible to make this web server executearbitrary code with this attack.Risk factor : HighSolution : Upgrade your web server."; script_description(english:desc["english"]);  summary["english"] = "Web server overflow with POST data"; script_summary(english:summary["english"]);  script_category(ACT_MIXED_ATTACK);   script_copyright(english:"This script is Copyright (C) 2003 Michel Arboi"); family["english"] = "Gain root remotely"; family["francais"] = "Passer root 

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?