Nmap Development mailing list archives

New VA Modules: NSE: 9, OpenVAS: 5


From: New VA Module Alert Service <postmaster () insecure org>
Date: Mon, 2 Jan 2012 10:00:52 -0800 (PST)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== Nmap Scripting Engine scripts (9) ==

r27748 vmauthd-brute http://nmap.org/nsedoc/scripts/vmauthd-brute.html
Performs brute force password guessing against the VMWare Authentication
Daemon (vmware-authd)

r27749 socks-brute http://nmap.org/nsedoc/scripts/socks-brute.html
Performs brute force password guessing against SOCKS 5 servers

r27750 http-proxy-brute http://nmap.org/nsedoc/scripts/http-proxy-brute.html
Performs brute force password guessing against a HTTP proxy server

r27751 redis-info http://nmap.org/nsedoc/scripts/redis-info.html
Gets information from a Redis key-value store

r27751 redis-brute http://nmap.org/nsedoc/scripts/redis-brute.html
Performs brute force passwords guessing against a Redis key-value store

r27752 memcached-info http://nmap.org/nsedoc/scripts/memcached-info.html
Retrieves information from distributed memory object caching system
memcached

r27753 socks-auth-info http://nmap.org/nsedoc/scripts/socks-auth-info.html
Determines the supported authentication mechanisms of the remote SOCKS
server. Starting with SOCKS version 5 socks servers may support
authentication. The script checks for the following authentication
types: 0 - No authentication 1 - GSSAPI 2 - Username and password

r27754 riak-http-info http://nmap.org/nsedoc/scripts/riak-http-info.html
Retrieves information from a Basho Riak distributed database using the
HTTP protocol.

r27755 nat-pmp-mapport http://nmap.org/nsedoc/scripts/nat-pmp-mapport.html
Maps a WAN port on the router to a local port on the client. The script
uses the NAT Port Mapping Protocol (NAT-PMP) to do so and supports the
following operations: o map - maps a new external port on the router to
an internal port of the requesting IP o unmap - unmaps a previously
mapped port for the requesting IP o unmapall - unmaps all previously
mapped ports for the requesting IP

== OpenVAS plugins (5) ==

r12398 103375 gb_rips_lfi_01_12.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_rips_lfi_01_12.nasl?root=openvas&view=markup
Rips Local File Include Vulnerability

r12399 802367 gb_qqplayer_mov_file_bof_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_qqplayer_mov_file_bof_vuln.nasl?root=openvas&view=markup
QQPlayer MOV File Processing Buffer Overflow Vulnerability

r12399 831519 gb_mandriva_MDVA_2011_099.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2011_099.nasl?root=openvas&view=markup
Mandriva Update for mysql MDVA-2011:099 (mysql)

r12399 831518 gb_mandriva_MDVSA_2011_197.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_197.nasl?root=openvas&view=markup
Mandriva Update for php MDVSA-2011:197 (php)

r12399 802288 gb_wordpress_wp_symposium_plugin_uid_param_xss_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_wordpress_wp_symposium_plugin_uid_param_xss_vuln.nasl?root=openvas&view=markup
WordPress WP Symposium Plugin 'uid' Parameter Cross-Site Scripting
Vulnerability
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: