Nmap Development mailing list archives

New VA Modules: NSE: 3, OpenVAS: 7, Nessus: 11


From: New VA Module Alert Service <postmaster () insecure org>
Date: Thu, 20 Sep 2012 10:01:05 -0700 (PDT)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== Nmap Scripting Engine scripts (3) ==

r29835 ipv6-ra-flood http://nmap.org/nsedoc/scripts/ipv6-ra-flood.html
https://svn.nmap.org/nmap/scripts/ipv6-ra-flood.nse
Generates a flood of Router Adverisments (RA) with randomized source MAC
address and annouced IPv6 prefixes causing machines to be DoSed.

r29836 cassandra-brute http://nmap.org/nsedoc/scripts/cassandra-brute.html
https://svn.nmap.org/nmap/scripts/cassandra-brute.nse
Performs brute force password auditing against the Cassandra database.

r29836 cassandra-info http://nmap.org/nsedoc/scripts/cassandra-info.html
https://svn.nmap.org/nmap/scripts/cassandra-info.nse
Attempts to get basic info and server status from a Cassandra database.

== OpenVAS plugins (7) ==

r14131 72213 freebsd_bind991.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/freebsd_bind991.nasl?root=openvas&view=markup
FreeBSD Ports: bind99

r14131 72206 deb_2480_4.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/deb_2480_4.nasl?root=openvas&view=markup
Debian Security Advisory DSA 2480-4 (request-tracker3.8)

r14131 72214 freebsd_jenkins0.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/freebsd_jenkins0.nasl?root=openvas&view=markup
FreeBSD Ports: jenkins

r14131 72207 deb_2549_1.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/deb_2549_1.nasl?root=openvas&view=markup
Debian Security Advisory DSA 2549-1 (devscripts)

r14136 gb_thomson_TWG850-4_2012.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_thomson_TWG850-4_2012.nasl?root=openvas&view=markup
Thomson Wireless VoIP Cable Modem Authentication Bypass

r14136 gb_simatic_wincc_hmi_51836.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_simatic_wincc_hmi_51836.nasl?root=openvas&view=markup
Siemens SIMATIC WinCC HMI Web Server Multiple Input Validation
Vulnerabilities

r14136 gb_simatic_s7_1200.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_simatic_s7_1200.nasl?root=openvas&view=markup
Siemens SIMATIC S7-1200 SSL Private Key Reuse Spoofing Vulnerability

== Nessus plugins (11) ==

62212 ubuntu_USN-1575-1.nasl
http://nessus.org/plugins/index.php?view=single&id=62212
USN-1575-1 : linux-lts-backport-oneiric vulnerabilities

62211 ubuntu_USN-1574-1.nasl
http://nessus.org/plugins/index.php?view=single&id=62211
USN-1574-1 : linux-lts-backport-natty vulnerabilities

62210 suse_ghostscript-fonts-other-8290.nasl
http://nessus.org/plugins/index.php?view=single&id=62210
SuSE 10 Security Update : ghostscript (ZYPP Patch Number 8290)

62209 redhat-RHSA-2012-1269.nasl
http://nessus.org/plugins/index.php?view=single&id=62209
RHSA-2012-1269: python-qpid

62208 freebsd_pkg_ec255bd802c611e292d1000d601460a4.nasl
http://nessus.org/plugins/index.php?view=single&id=62208
FreeBSD : php5-sqlite -- open_basedir bypass
(ec255bd8-02c6-11e2-92d1-000d601460a4)

62207 freebsd_pkg_9b2a5e8802b811e292d1000d601460a4.nasl
http://nessus.org/plugins/index.php?view=single&id=62207
FreeBSD : php5 -- Denial of Service in php_date_parse_tzfile()
(9b2a5e88-02b8-11e2-92d1-000d601460a4)

62206 centos_RHSA-2012-1288.nasl
http://nessus.org/plugins/index.php?view=single&id=62206
CentOS : RHSA-2012-1288

62205 wordpress_mac_photo_gallery_file_disclosure.nasl
http://nessus.org/plugins/index.php?view=single&id=62205
Mac Photo Gallery for WordPress albid Parameter Traversal Arbitrary File
Access

62204 hp_database_archiving_detect.nasl
http://nessus.org/plugins/index.php?view=single&id=62204
HP Database Archiving Software Detection

62203 account_user_user.nasl
http://nessus.org/plugins/index.php?view=single&id=62203
Default Password (user) for 'user' Account

62202 west_wind_webconnect_unauth_admin_access.nasl
http://nessus.org/plugins/index.php?view=single&id=62202
West Wind Web Connection Unprotected Configuration Editor Application
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: