Nmap Development mailing list archives
New VA Modules: NSE: 2, MSF: 1, Nessus: 12
From: New VA Module Alert Service <postmaster () insecure org>
Date: Wed, 23 May 2012 10:00:23 -0700 (PDT)
This report describes any new scripts/modules/exploits added to Nmap, OpenVAS, Metasploit, and Nessus since yesterday. == Nmap Scripting Engine scripts (2) == r28652 icap-info http://nmap.org/nsedoc/scripts/icap-info.html https://svn.nmap.org/nmap/scripts/icap-info.nse Tries a list of known ICAP service names and prints information about the ones it detects. The Internet Content Adaptation Protocol (ICAP) is used to extend transparent proxy server and is generally used for content filtering and antivirus scanning. r28655 distcc-cve2004-2687 http://nmap.org/nsedoc/scripts/distcc-cve2004-2687.html https://svn.nmap.org/nmap/scripts/distcc-cve2004-2687.nse Detects and exploits a remote code execution vulnerability in the distributed compiler daemon distcc. The vulnerability was disclosed in 2002, but is still present in modern implementation due to poor configuration of the service. == Metasploit modules (1) == r15325 http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/fileformat/openoffice_ole.rb OpenOffice OLE Importer DocumentSummaryInformation Stream Handling Overflow == Nessus plugins (12) == 59238 ubuntu_USN-1449-1.nasl http://nessus.org/plugins/index.php?view=single&id=59238 USN-1449-1 : feedparser vulnerability 59237 suse_openssl-8112.nasl http://nessus.org/plugins/index.php?view=single&id=59237 SuSE 10 Security Update : openssl (ZYPP Patch Number 8112) 59236 solaris10_x86_148408.nasl http://nessus.org/plugins/index.php?view=single&id=59236 Solaris 10 (x86) : 148408-01 59235 solaris10_x86_148007.nasl http://nessus.org/plugins/index.php?view=single&id=59235 Solaris 10 (x86) : 148007-01 59234 solaris10_x86_141105.nasl http://nessus.org/plugins/index.php?view=single&id=59234 Solaris 10 (x86) : 141105-04 59233 centos_RHSA-2012-0683.nasl http://nessus.org/plugins/index.php?view=single&id=59233 CentOS : RHSA-2012-0683 59232 liferay_6_1_0_addUser.nasl http://nessus.org/plugins/index.php?view=single&id=59232 Liferay Portal 6.1.0 'addUser()' Security Bypass 59231 liferay_6_1_0.nasl http://nessus.org/plugins/index.php?view=single&id=59231 Liferay Portal 6.0.5 / 6.0.6 Arbitrary File Download 59230 liferay_6_0_6.nasl http://nessus.org/plugins/index.php?view=single&id=59230 Liferay Portal < 6.0.6 Multiple Vulnerabilities 59229 liferay_default_creds.nasl http://nessus.org/plugins/index.php?view=single&id=59229 Liferay Portal Default Credentials 59228 liferay_detect.nasl http://nessus.org/plugins/index.php?view=single&id=59228 Liferay Portal Detection 59227 cisco_asa_proxy_info_leak.nasl http://nessus.org/plugins/index.php?view=single&id=59227 Cisco ASA Cut Through Proxy Authentication Vulnerability _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- New VA Modules: NSE: 2, MSF: 1, Nessus: 12 New VA Module Alert Service (May 23)