Nmap Development mailing list archives

New VA Modules: NSE: 2, MSF: 1, Nessus: 12


From: New VA Module Alert Service <postmaster () insecure org>
Date: Wed, 23 May 2012 10:00:23 -0700 (PDT)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== Nmap Scripting Engine scripts (2) ==

r28652 icap-info http://nmap.org/nsedoc/scripts/icap-info.html
https://svn.nmap.org/nmap/scripts/icap-info.nse
Tries a list of known ICAP service names and prints information about
the ones it detects. The Internet Content Adaptation Protocol (ICAP) is
used to extend transparent proxy server and is generally used for
content filtering and antivirus scanning.

r28655 distcc-cve2004-2687 http://nmap.org/nsedoc/scripts/distcc-cve2004-2687.html
https://svn.nmap.org/nmap/scripts/distcc-cve2004-2687.nse
Detects and exploits a remote code execution vulnerability in the
distributed compiler daemon distcc. The vulnerability was disclosed in
2002, but is still present in modern implementation due to poor
configuration of the service.

== Metasploit modules (1) ==

r15325 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/fileformat/openoffice_ole.rb
OpenOffice OLE Importer DocumentSummaryInformation Stream Handling
Overflow

== Nessus plugins (12) ==

59238 ubuntu_USN-1449-1.nasl
http://nessus.org/plugins/index.php?view=single&id=59238
USN-1449-1 : feedparser vulnerability

59237 suse_openssl-8112.nasl
http://nessus.org/plugins/index.php?view=single&id=59237
SuSE 10 Security Update : openssl (ZYPP Patch Number 8112)

59236 solaris10_x86_148408.nasl
http://nessus.org/plugins/index.php?view=single&id=59236
Solaris 10 (x86) : 148408-01

59235 solaris10_x86_148007.nasl
http://nessus.org/plugins/index.php?view=single&id=59235
Solaris 10 (x86) : 148007-01

59234 solaris10_x86_141105.nasl
http://nessus.org/plugins/index.php?view=single&id=59234
Solaris 10 (x86) : 141105-04

59233 centos_RHSA-2012-0683.nasl
http://nessus.org/plugins/index.php?view=single&id=59233
CentOS : RHSA-2012-0683

59232 liferay_6_1_0_addUser.nasl
http://nessus.org/plugins/index.php?view=single&id=59232
Liferay Portal 6.1.0 'addUser()' Security Bypass

59231 liferay_6_1_0.nasl
http://nessus.org/plugins/index.php?view=single&id=59231
Liferay Portal 6.0.5 / 6.0.6 Arbitrary File Download

59230 liferay_6_0_6.nasl
http://nessus.org/plugins/index.php?view=single&id=59230
Liferay Portal < 6.0.6 Multiple Vulnerabilities

59229 liferay_default_creds.nasl
http://nessus.org/plugins/index.php?view=single&id=59229
Liferay Portal Default Credentials

59228 liferay_detect.nasl
http://nessus.org/plugins/index.php?view=single&id=59228
Liferay Portal Detection

59227 cisco_asa_proxy_info_leak.nasl
http://nessus.org/plugins/index.php?view=single&id=59227
Cisco ASA Cut Through Proxy Authentication Vulnerability
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: