Nmap Development mailing list archives
New VA Modules: NSE: 9, OpenVAS: 5
From: New VA Module Alert Service <postmaster () insecure org>
Date: Mon, 2 Jan 2012 10:00:52 -0800 (PST)
This report describes any new scripts/modules/exploits added to Nmap, OpenVAS, Metasploit, and Nessus since yesterday. == Nmap Scripting Engine scripts (9) == r27748 vmauthd-brute http://nmap.org/nsedoc/scripts/vmauthd-brute.html Performs brute force password guessing against the VMWare Authentication Daemon (vmware-authd) r27749 socks-brute http://nmap.org/nsedoc/scripts/socks-brute.html Performs brute force password guessing against SOCKS 5 servers r27750 http-proxy-brute http://nmap.org/nsedoc/scripts/http-proxy-brute.html Performs brute force password guessing against a HTTP proxy server r27751 redis-info http://nmap.org/nsedoc/scripts/redis-info.html Gets information from a Redis key-value store r27751 redis-brute http://nmap.org/nsedoc/scripts/redis-brute.html Performs brute force passwords guessing against a Redis key-value store r27752 memcached-info http://nmap.org/nsedoc/scripts/memcached-info.html Retrieves information from distributed memory object caching system memcached r27753 socks-auth-info http://nmap.org/nsedoc/scripts/socks-auth-info.html Determines the supported authentication mechanisms of the remote SOCKS server. Starting with SOCKS version 5 socks servers may support authentication. The script checks for the following authentication types: 0 - No authentication 1 - GSSAPI 2 - Username and password r27754 riak-http-info http://nmap.org/nsedoc/scripts/riak-http-info.html Retrieves information from a Basho Riak distributed database using the HTTP protocol. r27755 nat-pmp-mapport http://nmap.org/nsedoc/scripts/nat-pmp-mapport.html Maps a WAN port on the router to a local port on the client. The script uses the NAT Port Mapping Protocol (NAT-PMP) to do so and supports the following operations: o map - maps a new external port on the router to an internal port of the requesting IP o unmap - unmaps a previously mapped port for the requesting IP o unmapall - unmaps all previously mapped ports for the requesting IP == OpenVAS plugins (5) == r12398 103375 gb_rips_lfi_01_12.nasl http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_rips_lfi_01_12.nasl?root=openvas&view=markup Rips Local File Include Vulnerability r12399 802367 gb_qqplayer_mov_file_bof_vuln.nasl http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_qqplayer_mov_file_bof_vuln.nasl?root=openvas&view=markup QQPlayer MOV File Processing Buffer Overflow Vulnerability r12399 831519 gb_mandriva_MDVA_2011_099.nasl http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2011_099.nasl?root=openvas&view=markup Mandriva Update for mysql MDVA-2011:099 (mysql) r12399 831518 gb_mandriva_MDVSA_2011_197.nasl http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_197.nasl?root=openvas&view=markup Mandriva Update for php MDVSA-2011:197 (php) r12399 802288 gb_wordpress_wp_symposium_plugin_uid_param_xss_vuln.nasl http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_wordpress_wp_symposium_plugin_uid_param_xss_vuln.nasl?root=openvas&view=markup WordPress WP Symposium Plugin 'uid' Parameter Cross-Site Scripting Vulnerability _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- New VA Modules: NSE: 9, OpenVAS: 5 New VA Module Alert Service (Jan 02)
- Re: New VA Modules: NSE: 9, OpenVAS: 5 Fyodor (Jan 09)