Nmap Development mailing list archives

New VA Modules: NSE: 1, OpenVAS: 4, MSF: 3


From: New VA Module Alert Service <postmaster () insecure org>
Date: Tue, 1 Nov 2011 10:00:39 -0700 (PDT)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== Nmap Scripting Engine scripts (1) ==

r26964 dns-zeustracker http://nmap.org/nsedoc/scripts/dns-zeustracker.html
Check if your IP-range is part of a Zeus botnet by quering ZTDNS @
abuse.ch! Please review the following information before you start to
scan:
* https://zeustracker.abuse.ch/ztdns.php

== OpenVAS plugins (4) ==

r11911 103322 gb_phpalbum_50437.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_phpalbum_50437.nasl?root=openvas&view=markup
phpAlbum Multiple Security Vulnerabilities

r11911 103320 gb_squid_50449.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_squid_50449.nasl?root=openvas&view=markup
Squid Proxy Caching Server CNAME Denial of Service Vulnerability

r11911 103321 gb_YaTFTPSvr_50441.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_YaTFTPSvr_50441.nasl?root=openvas&view=markup
YaTFTPSvr TFTP Server Directory Traversal Vulnerability

r11911 103323 gb_joomla_50451.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_joomla_50451.nasl?root=openvas&view=markup
Joomla! Alameda Component 'storeid' Parameter SQL Injection
Vulnerability

== Metasploit modules (3) ==

r14127 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/http/cold_fusion_version.rb
ColdFusion Version Scanner

r14133 http://metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/misc/redis_server.rb
Redis-server Scanner

r14135 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/smtp/njstar_smtp_bof.rb
NJStar Communicator 3.00 MiniSMTP Server Remote Exploit
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: