⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 dwhttp_format_string.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
## This script was written by Michel Arboi <arboi@alussinan.org>## Script audit and contributions from Carmichael Security <http://www.carmichaelsecurity.com>#      Erik Anderson <eanders@carmichaelsecurity.com>#      Added BugtraqID#      This script could also cover BID:1556 and CVE-2000-0697## GPL# *untested*## References:## Date:  Thu, 1 Aug 2002 16:31:40 -0600 (MDT)		      # From: "ghandi" <ghandi@mindless.com>			      # To: bugtraq@securityfocus.com				      # Subject: Sun AnswerBook2 format string and other vulnerabilities## Affected:# dwhttp/4.0.2a7a, dwhttpd/4.1a6# And others?if(description){ script_id(11075); script_bugtraq_id(5384); script_version ("$Revision: 38 $"); name["english"] = "dwhttpd format string"; script_name(english:name["english"]);  desc["english"] = "The remote web server is vulnerable to a format string attack.A cracker may exploit this vulnerability to make your web servercrash continually or even execute arbirtray code on your system.Solution : upgrade your software or protect it with a filtering reverse proxyRisk factor : High"; script_description(english:desc["english"]);  summary["english"] = "DynaWeb server vulnerable to format string"; script_summary(english:summary["english"]);  script_category(ACT_MIXED_ATTACK);  script_copyright(english:"This script is Copyright (C) 2002 Michel Arboi"); family["english"] = "Gain root remotely"; family["francais"] = "Passer root 

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -