Grabs the Server header and runs the values through a vulnerability database. Neat.
But those synopses are a bit sensational specially when read by someone who is not familiar with how PHP core vulnerabilities are exploited. On Dec 6, 2007 8:33 PM, George A. Theall <[EMAIL PROTECTED]> wrote: > On Wed, Dec 05, 2007 at 09:28:31PM -0500, Dude VanWinkle wrote: > > > Looks like Nessus output to me. > > Close. It's something called Tenable's Passive Vulnerability Scanner, > previously known as Nevo. The person using it only needed to visit the > web sites in question to generate the results. > > > George > -- > [EMAIL PROTECTED] > > _______________________________________________ > Fun and Misc security discussion for OT posts. > https://linuxbox.org/cgi-bin/mailman/listinfo/funsec > Note: funsec is a public and open mailing list. > _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
