Jump to content

narutopgm

Member
  • Posts

    7
  • Joined

  • Last visited

narutopgm's Achievements

Junior Member

Junior Member (1/8)

0

Reputation

  1. update ok with "cd /home/tcadmin/Monitor && ./updatetool 2.0.45"
  2. After this update, my panel is down !
  3. Update fail ! "Error: ConnectFailure (Connection refused)"
  4. Hello What is a solution for update all server in one time ? Thx ps: steam update
  5. Sorry it's my fault, i put 5 sec in the text console, with 20 sec no problem
  6. Hello, I have a problem with the server restart, it happens when I click restart the server the server does not reboot and duplicate this process over a spear. my favorite server after 1 retry : ps aux |grep 27015|grep -v grep tcagame 3996 3.5 0.4 202636 77388 ? S<l 14:26 0:01 ./srcds_linux -console -game cstrike -condebug +maxplayers 14 +ip 178.33.255.249 -port 27015 +exec server.cfg +map de_dust2 +fps_max 66.67 +clientport 57015 +tv_port 47015 +replay_port 37015 tcagame 4083 4.3 0.3 199544 73364 ? S<l 14:26 0:01 ./srcds_linux -console -game cstrike -condebug +maxplayers 14 +ip 178.33.255.249 -port 27015 +exec server.cfg +map de_dust2 +fps_max 66.67 +clientport 57015 +tv_port 47015 +replay_port 37015 tcagame 4096 0.0 0.0 12076 1508 ? S< 14:26 0:00 /bin/sh /home/tcagame/Admin/4/orangebox/srcds_run -console -game cstrike -condebug +maxplayers 14 +ip 178.33.255.249 -port 27015 +exec server.cfg +map de_dust2 +fps_max 66.67 +clientport 57015 +tv_port 47015 +replay_port 37015 tcagame 4101 4.5 0.3 198144 72664 ? S<l 14:26 0:01 ./srcds_linux -console -game cstrike -condebug +maxplayers 14 +ip 178.33.255.249 -port 27015 +exec server.cfg +map de_dust2 +fps_max 66.67 +clientport 57015 +tv_port 47015 +replay_port 37015
  7. Hello nessus report XSS atack. Synopsis: The remote web server is prone to cross-site scripting attacks. Description The remote host is running a web server that fails to adequately sanitize request strings of malicious JavaScript. By leveraging this issue, an attacker may be able to cause arbitrary HTML and script code to be executed in a user's browser within the security context of the affected site. Solution Contact the vendor for a patch or upgrade. See Also http://en.wikipedia.org/wiki/Cross-site_scripting Risk Factor: Medium CVSS Base Score 4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N) CVSS Temporal Score 3.6 (CVSS2#E:F/RL:OF/RC:C) Plugin Output The request string used to detect this flaw was : <script>cross_site_scripting.nasl</script> The output was : HTTP/1.1 400 Bad Request Content-Type: text/html; charset=utf-8 Server: Mono-HTTPAPI/1.0 Date: Wed, 24 Aug 2011 15:39:37 GMT Content-Length: 111 Connection: close <h1>Bad Request (Invalid url: http://sd001.***********.eu:8890<script>c ross_site_scripting.nasl</script>)</h1> CVE CVE-2002-1700 CVE-2003-1543 CVE-2005-2453 CVE-2006-1681 BID 5011 5305 7344 7353 8037 14473 17408 Xref OSVDB:18525 OSVDB:24469 OSVDB:42314 OSVDB:4989 OSVDB:58976 CWE:79 CWE:80 CWE:81 CWE:83 CWE:20 CWE:74 CWE:442 CWE:712 CWE:722 CWE:725 CWE:811 CWE:751 CWE:801 CWE:116 Vulnerability Publication Date: 2004/04/09 Plugin Publication Date: 2001/11/30 Plugin Last Modification Date: 2011/03/14 Public Exploit Available: True
  8. hello nessus report cookie injection. Synopsis: The remote web server is prone to a cookie injection attack. Description The remote host is running a web server that fails to adequately sanitize request strings of malicious JavaScript. By leveraging this issue, an attacker may be able to inject arbitrary cookies. Depending on the structure of the web application, it may be possible to launch a 'session fixation' attack using this mechanism. Please note that : - Nessus did not check if the session fixation attack is feasible. - This is not the only vector of session fixation. Solution Contact the vendor for a patch or upgrade. See Also http://en.wikipedia.org/wiki/Session_fixation http://www.owasp.org/index.php/Session_Fixation http://www.acros.si/papers/session_fixation.pdf http://projects.webappsec.org/Session-Fixation Risk Factor: Medium CVSS Base Score 4.3 (CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N) Plugin Output The request string used to detect this flaw was : <script>document.cookie=%22testkzqg=5603;%22</script> The output was : HTTP/1.1 400 Bad Request Content-Type: text/html; charset=utf-8 Server: Mono-HTTPAPI/1.0 Date: Wed, 24 Aug 2011 15:39:32 GMT Content-Length: 118 Connection: close <h1>Bad Request (Invalid url: http://sd001.**********.eu:8890<script>document.cookie="testkzqg=5603;"</script>)</h1> Plugin Publication Date: 2010/01/25 Plugin Last Modification Date: 2011/03/14
  9. I try 9015 and 0 with custom port expression $[service.gameport] + 7000 And all test return 0
  10. Hi, Why Custom Port1 return 0 in the command line manager? thx CSS - Windows.xml
  11. ${Service_GamePort} don't work but ${ThisService_GamePort} work !
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue. Terms of Use