[<prev] [next>] [day] [month] [year] [list]
Message-ID: <520B608D.7030703@computec.ch>
Date: Wed, 14 Aug 2013 12:48:45 +0200
From: Marc Ruef <marc.ruef@...putec.ch>
To: dev@...p.org
Cc: submissions@...ketstormsecurity.com, full-disclosure@...ts.grok.org.uk,
news@...uriteam.com
Subject: [NSE] Release of Nmap NSE Vulscan 2.0
Hello,
A have just published Nmap NSE Vulscan 2.0 on the new project web site:
http://www.computec.ch/projekte/vulscan/
The following things have been changed:
* Added version identification support, which may improve the accuracy
of findings as long as the linked vulnerability databases provide
version information (supported by CVE, Exploit-DB, and scip VulDB).
* Squashed a parsing bug if the server response did contain a special
character. This caused the script to fail under some circumstances.
(Thanks to Roelof Temmingh and Andrew MacPherson of Paterva for reporting)
* Added the following vulnerability databases to the default repository:
Exploit-DB (thanks to @unex_root for the hint), ISS X-Force, OpenVAS/Nessus.
* Updated all vulnerability databases, which are regularly maintained on
the project web site. A dedicated update of single databases becomes easy.
Regards,
Marc
--
Marc Ruef | marc.ruef@...putec.ch | http://www.computec.ch/mruef/
_________________________________________________________________
Meine letzte Publikation: "Risiken akzeptieren, Auswirkungen aber nicht"
http://www.computec.ch/news.php?item.406
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists