Nmap Development mailing list archives

New VA Modules: NSE: 4, OpenVAS: 4, MSF: 3, Nessus: 28


From: New VA Module Alert Service <postmaster () insecure org>
Date: Tue, 6 Sep 2011 10:02:30 -0700 (PDT)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== Nmap Scripting Engine scripts (4) ==

r26285 targets-ipv6-multicast-echo http://nmap.org/nsedoc/scripts/targets-ipv6-multicast-echo.html
Multicast echo ping. Do a very fast host discovery on link-local IPv6
network.

r26285 targets-ipv6-multicast-invalid-dst http://nmap.org/nsedoc/scripts/targets-ipv6-multicast-invalid-dst.html
Multicast invalid destination options ping. Do a very fast host
discovery on link-local IPv6 network.

r26285 targets-ipv6-multicast-slaac http://nmap.org/nsedoc/scripts/targets-ipv6-multicast-slaac.html
SLAAC-based host discovery. Do a very fast host discovery on link-local
IPv6 network.

r26323 xmpp-info http://nmap.org/nsedoc/scripts/xmpp-info.html
Connects to XMPP server (port 5222) and collects server information such
as: supported auth mechanisms, compression methods, whether TLS is
supported and mandatory, stream management, language, support of In-Band
registration, server capabilities. If possible, studies server vendor.

== OpenVAS plugins (4) ==

r11549 103238 gb_pandora_fms_49261.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_pandora_fms_49261.nasl?root=openvas&view=markup
Pandora FMS 'index.php' Cross Site Scripting Vulnerability

r11549 103237 gb_dienstplan_49412.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_dienstplan_49412.nasl?root=openvas&view=markup
Dienstplan Predictable Random Password Generation Vulnerability

r11571 103240 default_http_auth_credentials.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/default_http_auth_credentials.nasl?root=openvas&view=markup
HTTP Brute Force Logins with default Credentials

r11571 103239 default_ssh_credentials.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/default_ssh_credentials.nasl?root=openvas&view=markup
SSH Brute Force Logins with default Credentials

== Metasploit modules (3) ==

r13681 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/dos/syslog/rsyslog_long_tag.rb
rsyslog Long Tag Off-By-Two DoS

r13686 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/gather/enum_ms_product_keys.rb
Windows Gather Product Key

r13691 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/fileformat/apple_quicktime_pnsize.rb
Apple QuickTime PICT PnSize Buffer Overflow

== Nessus plugins (28) ==

56089 ubuntu_USN-1197-2.nasl
http://nessus.org/plugins/index.php?view=single&id=56089
USN-1197-2 : thunderbird vulnerability

56088 solaris9_x86_121195.nasl
http://nessus.org/plugins/index.php?view=single&id=56088
Solaris 9 (x86) : 121195-02

56087 solaris9_121194.nasl
http://nessus.org/plugins/index.php?view=single&id=56087
Solaris 9 (sparc) : 121194-02

56086 redhat-RHSA-2011-1248.nasl
http://nessus.org/plugins/index.php?view=single&id=56086
RHSA-2011-1248: ca-certificates

56085 mandriva_MDVSA-2011-131.nasl
http://nessus.org/plugins/index.php?view=single&id=56085
MDVSA-2011:131 : libxml

56084 mandriva_MDVSA-2011-130.nasl
http://nessus.org/plugins/index.php?view=single&id=56084
MDVSA-2011:130 : apache

56083 mandriva_MDVSA-2011-129.nasl
http://nessus.org/plugins/index.php?view=single&id=56083
MDVSA-2011:129 : mozilla

56082 freebsd_pkg_e55f948fd72911e0abd10017f22d6707.nasl
http://nessus.org/plugins/index.php?view=single&id=56082
FreeBSD : security/cfs -- buffer overflow (5479)

56081 freebsd_pkg_aa5bc971d63511e0b3cf080027ef73ec.nasl
http://nessus.org/plugins/index.php?view=single&id=56081
FreeBSD : nss/ca_root_nss -- Fraudulent Certificates issued by
DigiNotar.nl (5476)

56080 freebsd_pkg_a83f25dfd77511e08bf1003067b2972c.nasl
http://nessus.org/plugins/index.php?view=single&id=56080
FreeBSD : XSS issue in MantisBT (5480)

56079 freebsd_pkg_7c492ea2356611e08e810022190034c0.nasl
http://nessus.org/plugins/index.php?view=single&id=56079
FreeBSD : plone -- Remote Security Bypass (5478)

56078 freebsd_pkg_1b27af46d6f611e089a6080027ef73ec.nasl
http://nessus.org/plugins/index.php?view=single&id=56078
FreeBSD : ca_root_nss -- Extraction of unsafe certificates into trust
bundle. (5477)

56077 freebsd_pkg_09639ccc3abb11db81e1000e0c2e438a.nasl
http://nessus.org/plugins/index.php?view=single&id=56077
FreeBSD : hlstats -- multiple cross site scripting vulnerabilities
(5475)

56076 fedora_2011-10733.nasl
http://nessus.org/plugins/index.php?view=single&id=56076
Fedora 15 2011-10733

56075 fedora_2011-10718.nasl
http://nessus.org/plugins/index.php?view=single&id=56075
Fedora 14 2011-10718

56074 debian_DSA-2301.nasl
http://nessus.org/plugins/index.php?view=single&id=56074
[DSA2301] DSA-2301-1 rails

56073 centos_RHSA-2011-1244.nasl
http://nessus.org/plugins/index.php?view=single&id=56073
CentOS : RHSA-2011-1244

56072 centos_RHSA-2011-1243.nasl
http://nessus.org/plugins/index.php?view=single&id=56072
CentOS : RHSA-2011-1243

56071 centos_RHSA-2011-1242.nasl
http://nessus.org/plugins/index.php?view=single&id=56071
CentOS : RHSA-2011-1242

56070 tomcat_7_0_21.nasl
http://nessus.org/plugins/index.php?view=single&id=56070
Apache Tomcat 7.x < 7.0.21 Arbitrary AJP Message Control

56048 ubuntu_USN-1199-1.nasl
http://nessus.org/plugins/index.php?view=single&id=56048
USN-1199-1 : apache2 vulnerability

56047 redhat-RHSA-2011-1247.nasl
http://nessus.org/plugins/index.php?view=single&id=56047
RHSA-2011-1247: rsyslog

56046 centos_RHSA-2011-1245.nasl
http://nessus.org/plugins/index.php?view=single&id=56046
CentOS : RHSA-2011-1245

56045 cisco-sa-20100804-asa.nasl
http://nessus.org/plugins/index.php?view=single&id=56045
Cisco ASA 5500 Series Multiple DoS Vulnerabilities
(cisco-sa-20100804-asa)

56044 qos_kb2563894.nasl
http://nessus.org/plugins/index.php?view=single&id=56044
MS11-064: Vulnerabilities in TCP/IP Stack Could Allow Denial of Service
(2563894) (uncredentialed check)

56043 ssl_diginotar.nasl
http://nessus.org/plugins/index.php?view=single&id=56043
SSL Certificate signed with the revoked DigiNotar Certificate Authority

56042 opera_1151.nasl
http://nessus.org/plugins/index.php?view=single&id=56042
Opera < 11.51 Multiple Vulnerabilities

56041 seamonkey_232.nasl
http://nessus.org/plugins/index.php?view=single&id=56041
SeaMonkey 2.x < 2.3.2 Out-of-Date CA List
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: