simplewww.nasl
来自「漏洞扫描源码,可以扫描linux,windows,交换机路由器」· NASL 代码 · 共 41 行
NASL
41 行
## This script was written by Mathieu Meadele <mm@omnix.net>## Script audit and contributions from Carmichael Security <http://www.carmichaelsecurity.com># Erik Anderson <eanders@carmichaelsecurity.com># Added BugtraqID## (minor changes by rd)#if(description){ script_id(10705); script_bugtraq_id(3112); script_version ("$Revision: 38 $"); name["english"] = "SimpleServer remote execution"; name["francais"] = "SimpleServer execution de commandes a distance"; script_name(english:name["english"], francais:name["francais"]); desc["english"] ="By sending a specially encoded string to the remote server,it is possible to execute remote commands with the privileges of the server.Solution: Upgrade SimpleServer to version 1.15.Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "Check the remote execution vulnerability in SimpleServer"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english: "Mathieu Meadele <mm@omnix.net>"); family["english"] = "Gain root remotely"; family["francais"] = "Passer root
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?