lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 14 Aug 2013 12:48:45 +0200 From: Marc Ruef <marc.ruef@...putec.ch> To: dev@...p.org Cc: submissions@...ketstormsecurity.com, full-disclosure@...ts.grok.org.uk, news@...uriteam.com Subject: [NSE] Release of Nmap NSE Vulscan 2.0 Hello, A have just published Nmap NSE Vulscan 2.0 on the new project web site: http://www.computec.ch/projekte/vulscan/ The following things have been changed: * Added version identification support, which may improve the accuracy of findings as long as the linked vulnerability databases provide version information (supported by CVE, Exploit-DB, and scip VulDB). * Squashed a parsing bug if the server response did contain a special character. This caused the script to fail under some circumstances. (Thanks to Roelof Temmingh and Andrew MacPherson of Paterva for reporting) * Added the following vulnerability databases to the default repository: Exploit-DB (thanks to @unex_root for the hint), ISS X-Force, OpenVAS/Nessus. * Updated all vulnerability databases, which are regularly maintained on the project web site. A dedicated update of single databases becomes easy. Regards, Marc -- Marc Ruef | marc.ruef@...putec.ch | http://www.computec.ch/mruef/ _________________________________________________________________ Meine letzte Publikation: "Risiken akzeptieren, Auswirkungen aber nicht" http://www.computec.ch/news.php?item.406 _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists