⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 localweb2k.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
# This script was created by Jason Lidow <jason@brandx.net># The vulnerability was originally discovered by ts@securityoffice.net if(description){	script_id(11005);	script_bugtraq_id(2268, 4820, 7947); 	script_cve_id("CVE-2001-0189");	script_version("$Revision: 38 $");	script_name(english:"LocalWeb2000 remote read");    script_description(english:"The remote host is running LocalWeb2000. Version 2.1.0 of LocalWeb2000 allows an attacker to view protected files on the host's computer. Example: http://www.vulnerableserver.com/./protectedfolder/protectedfile.htmIt may also disclose the NetBIOS name of the remote host whenit receives malformed directory requests.Solution: Contact http://www.intranet-server.co.uk for an update.	Risk factor : High");	script_summary(english:"Checks for LocalWeb2000");	script_category(ACT_GATHER_INFO);	script_copyright(english:"This script is Copyright (C) 2002 Jason Lidow <jason@brandx.net>");	script_family(english:"Remote file access");	script_dependencie("find_service.nes", "httpver.nasl", "no404.nasl");	script_require_ports("Services/www", 80);	exit(0);}include("http_func.inc");port = get_http_port(default:80);if(!get_port_state(port))exit(0);banner = get_http_banner(port:port);    if(banner){	if(egrep(pattern:"^Server: .*LocalWEB2000.*" , string:banner, icase:TRUE))	{	security_note(port);	}}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -