e72303a922
The modified version of pull request #453. This addresses a couple of things including: * Change the description to better explain what the vulnerability is. The advisory focuses the problem as an auth bypass, not DoS, although it can end up dosing the server. * The title and filename are changed as a result of matching that advisory's description. * Use 'TARGETURI' option instead of 'URI'. * The reset attempt needs to check if the directory actually has 401 in place, otherwise this may result a false-positive. * The last HTTP request needs to check a possible nil return value. * More verbose outputs. |
||
---|---|---|
.. | ||
2wire | ||
backupexec | ||
cisco | ||
db2 | ||
edirectory | ||
emc | ||
ftp | ||
hp | ||
http | ||
maxdb | ||
misc | ||
motorola | ||
ms | ||
mssql | ||
mysql | ||
natpmp | ||
officescan | ||
oracle | ||
pop2 | ||
postgres | ||
sap | ||
scada | ||
serverprotect | ||
smb | ||
sunrpc | ||
tftp | ||
tikiwiki | ||
vmware | ||
vnc | ||
vxworks | ||
webmin | ||
zend |