Author: jfs
Date: 2007-11-04 00:02:06 +0100 (Sun, 04 Nov 2007)
New Revision: 514

Added:
   trunk/openvas-plugins/audit/non-free-false-positives
Log:
Add a list of NASL scripts that trigger some of the non-free tests but are
actually GPL


Added: trunk/openvas-plugins/audit/non-free-false-positives
===================================================================
--- trunk/openvas-plugins/audit/non-free-false-positives        2007-11-03 
23:00:08 UTC (rev 513)
+++ trunk/openvas-plugins/audit/non-free-false-positives        2007-11-03 
23:02:06 UTC (rev 514)
@@ -0,0 +1,116 @@
+# GPL scripts written by  David Maciejak but hold a 'based on' and a Tenable 
(C)
+4d_webstar_symb_link.nasl
+abyss_msdos_dos.nasl
+apache_htpasswd_overflow.nasl
+apache_input_header_folding_dos.nasl
+apache_mod_include_priv_escalation.nasl
+apache_mod_proxy_buff_overflow.nasl
+apple-sa-2004-08-09.nasl
+argosoft_server_xcmd.nasl
+bblog_sql_inject.nasl
+Black_JumboDog_FTP_overflow.nasl
+breakcal_xss.nasl
+bugport_attachment_handling_flaw.nasl
+bugzilla_remote_exec.nasl
+cherokee_0_4_6.nasl
+cherokee_dir_traversal.nasl
+cherokee_remote_cmd.nasl
+citrix_xss.nasl
+cjoverkill_xss.nasl
+cutenews_indexphp_xss.nasl
+cutenews_xss.nasl
+cvs_file_existence_info_weak.nasl
+cvs_malformed_entry_lines_flaw.nasl
+cvstrac_account_deletion.nasl
+cvstrac_cgi_overflows.nasl
+cvstrac_db_plaintext_pass.nasl
+cvstrac_history_overflow.nasl
+cvstrac_invalid_ticket_dos.nasl
+cvstrac_jail_escape.nasl
+cvstrac_malformed_uri_dos.nasl
+cvstrac_ticket_title.nasl
+cvstrac_timeline_overflow.nasl
+ftp_servu_dos3.nasl
+gosmart_message_board.nasl
+hummingbird_ftp_overflow.nasl
+icecast_avllib_bof.nasl
+icecast_dir_traversal.nasl
+icecast_http_basic_auth.nasl
+icecast_libshout_bof.nasl
+icecast_rbof.nasl
+icecast_slash_dos.nasl
+icecast_xss.nasl
+inn_buff_overflow.nasl
+invision_pwb.nasl
+ircd_ignition_ircop_vuln.nasl
+mdaemon_imap_server_dos2.nasl
+mdaemon_imap_server_dos.nasl
+mdaemon_mail_server_dos.nasl
+mod_ssl_hook_functions_format_string_vuln.nasl
+moodle_php_reply_variable_xss.nasl
+mozilla_certif_handle_dos.nasl
+mozilla_default_perms.nasl
+mozilla_firefox_xul_spoof.nasl
+myserver_post_dos.nasl
+openbb_xss.nasl
+openca_mult_sign_flaws.nasl
+openca_sign_verif.nasl
+opera_address_bar_spoofing.nasl
+opera_favicon_address_bar_spoofing.nasl
+opera_file_corruption.nasl
+opera_file_download_extension_spoofing.nasl
+opera_large_javascript_array_vuln.nasl
+opera_news_url_dos.nasl
+opera_remote_location_object_flaw.nasl
+opera_skin_zip_file_overflow.nasl
+phpbb_fetch_all_sql_injection.nasl
+phpbb_search_author_xss.nasl
+phpbb_sql_injection3.nasl
+php_fusion_sql_inject.nasl
+php_fusion_xss.nasl
+phpgroupware_html_injection.nasl
+phpgroupware_plaintext_cookie_auth_vuln.nasl
+phpgroupware_remote_cmd.nasl
+phpgroupware_remote_file_include.nasl
+phpgroupware_server_side_exec_vuln.nasl
+phpgroupware_sql_injection.nasl
+phpgroupware_xss.nasl
+phpmyfaq_action_parameter_flaw.nasl
+php_strip_tags_memory_limit_vuln.nasl
+postgresql_tempfile.nasl
+postnuke_news_xss.nasl
+proftpd_user_enum.nasl
+psnews_xss.nasl
+putty_arbitrary_command_execution.nasl
+putty_logon_credential_leak.nasl
+rsync_path_sanitation_vuln.nasl
+samba_arbitrary_file_access.nasl
+securecrt_remote_overflow.nasl
+serendipity_xss.nasl
+squid_rdos.nasl
+sympa_do_search_list_overflow.nasl
+sympa_invalid_ldap_pass.nasl
+sympa_unauthorised_list_creation.nasl
+thttpd_directory_traversal.nasl
+tikiwiki_multiple_input_flaws.nasl
+tikiwiki_remote_flaws.nasl
+turboseek_read_file.nasl
+tutos_input_vuln.nasl
+vbulletin_xss2.nasl
+vbulletin_xss.nasl
+wackowiki_xss.nasl
+w_agora_dir_traversal.nasl
+ws_ftp_client_weak_stored_pass.nasl
+wu_ftpd_abor_priviledge_escalation.nasl
+wu_ftpd_mail_admin.nasl
+wu_ftpd_rnfr_file_overwrite.nasl
+wu_ftpd_skey_remote_buff.nasl
+yabb_xss.nasl
+yapig_remote_vuln.nasl
+zone_alarm_fw_p67.nasl
+zone_alarm_local_dos.nasl
+# (C) Tenable, but part of the GPL feed
+gpl_feed.nasl
+# (C) Tenable, but holds a GPL license
+embedded_web_server_detect.nasl
+scan_info.nasl

_______________________________________________
Openvas-commits mailing list
[email protected]
http://lists.wald.intevation.org/mailman/listinfo/openvas-commits

Reply via email to