Nmap Development mailing list archives
New VA Modules: NSE: 3, OpenVAS: 7, Nessus: 11
From: New VA Module Alert Service <postmaster () insecure org>
Date: Thu, 20 Sep 2012 10:01:05 -0700 (PDT)
This report describes any new scripts/modules/exploits added to Nmap, OpenVAS, Metasploit, and Nessus since yesterday. == Nmap Scripting Engine scripts (3) == r29835 ipv6-ra-flood http://nmap.org/nsedoc/scripts/ipv6-ra-flood.html https://svn.nmap.org/nmap/scripts/ipv6-ra-flood.nse Generates a flood of Router Adverisments (RA) with randomized source MAC address and annouced IPv6 prefixes causing machines to be DoSed. r29836 cassandra-brute http://nmap.org/nsedoc/scripts/cassandra-brute.html https://svn.nmap.org/nmap/scripts/cassandra-brute.nse Performs brute force password auditing against the Cassandra database. r29836 cassandra-info http://nmap.org/nsedoc/scripts/cassandra-info.html https://svn.nmap.org/nmap/scripts/cassandra-info.nse Attempts to get basic info and server status from a Cassandra database. == OpenVAS plugins (7) == r14131 72213 freebsd_bind991.nasl http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/freebsd_bind991.nasl?root=openvas&view=markup FreeBSD Ports: bind99 r14131 72206 deb_2480_4.nasl http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/deb_2480_4.nasl?root=openvas&view=markup Debian Security Advisory DSA 2480-4 (request-tracker3.8) r14131 72214 freebsd_jenkins0.nasl http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/freebsd_jenkins0.nasl?root=openvas&view=markup FreeBSD Ports: jenkins r14131 72207 deb_2549_1.nasl http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/deb_2549_1.nasl?root=openvas&view=markup Debian Security Advisory DSA 2549-1 (devscripts) r14136 gb_thomson_TWG850-4_2012.nasl http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_thomson_TWG850-4_2012.nasl?root=openvas&view=markup Thomson Wireless VoIP Cable Modem Authentication Bypass r14136 gb_simatic_wincc_hmi_51836.nasl http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_simatic_wincc_hmi_51836.nasl?root=openvas&view=markup Siemens SIMATIC WinCC HMI Web Server Multiple Input Validation Vulnerabilities r14136 gb_simatic_s7_1200.nasl http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_simatic_s7_1200.nasl?root=openvas&view=markup Siemens SIMATIC S7-1200 SSL Private Key Reuse Spoofing Vulnerability == Nessus plugins (11) == 62212 ubuntu_USN-1575-1.nasl http://nessus.org/plugins/index.php?view=single&id=62212 USN-1575-1 : linux-lts-backport-oneiric vulnerabilities 62211 ubuntu_USN-1574-1.nasl http://nessus.org/plugins/index.php?view=single&id=62211 USN-1574-1 : linux-lts-backport-natty vulnerabilities 62210 suse_ghostscript-fonts-other-8290.nasl http://nessus.org/plugins/index.php?view=single&id=62210 SuSE 10 Security Update : ghostscript (ZYPP Patch Number 8290) 62209 redhat-RHSA-2012-1269.nasl http://nessus.org/plugins/index.php?view=single&id=62209 RHSA-2012-1269: python-qpid 62208 freebsd_pkg_ec255bd802c611e292d1000d601460a4.nasl http://nessus.org/plugins/index.php?view=single&id=62208 FreeBSD : php5-sqlite -- open_basedir bypass (ec255bd8-02c6-11e2-92d1-000d601460a4) 62207 freebsd_pkg_9b2a5e8802b811e292d1000d601460a4.nasl http://nessus.org/plugins/index.php?view=single&id=62207 FreeBSD : php5 -- Denial of Service in php_date_parse_tzfile() (9b2a5e88-02b8-11e2-92d1-000d601460a4) 62206 centos_RHSA-2012-1288.nasl http://nessus.org/plugins/index.php?view=single&id=62206 CentOS : RHSA-2012-1288 62205 wordpress_mac_photo_gallery_file_disclosure.nasl http://nessus.org/plugins/index.php?view=single&id=62205 Mac Photo Gallery for WordPress albid Parameter Traversal Arbitrary File Access 62204 hp_database_archiving_detect.nasl http://nessus.org/plugins/index.php?view=single&id=62204 HP Database Archiving Software Detection 62203 account_user_user.nasl http://nessus.org/plugins/index.php?view=single&id=62203 Default Password (user) for 'user' Account 62202 west_wind_webconnect_unauth_admin_access.nasl http://nessus.org/plugins/index.php?view=single&id=62202 West Wind Web Connection Unprotected Configuration Editor Application _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- New VA Modules: NSE: 3, OpenVAS: 7, Nessus: 11 New VA Module Alert Service (Sep 20)