Grabs the Server header and runs the values through a vulnerability
database. Neat.

But those synopses are a bit sensational specially when read by
someone who is not familiar with how PHP core vulnerabilities are
exploited.

On Dec 6, 2007 8:33 PM, George A. Theall <[EMAIL PROTECTED]> wrote:
> On Wed, Dec 05, 2007 at 09:28:31PM -0500, Dude VanWinkle wrote:
>
> > Looks like Nessus output to me.
>
> Close.  It's something called Tenable's Passive Vulnerability Scanner,
> previously known as Nevo.  The person using it only needed to visit the
> web sites in question to generate the results.
>
>
> George
> --
> [EMAIL PROTECTED]
>
> _______________________________________________
> Fun and Misc security discussion for OT posts.
> https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
> Note: funsec is a public and open mailing list.
>
_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to