1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-10 09:49:05 +00:00

Add http-vuln-misfortune-cookie script. Closes #77

This commit is contained in:
dmiller
2015-05-31 18:33:44 +00:00
parent 00064a1809
commit 976d5d2a40
2 changed files with 6 additions and 1 deletions

View File

@@ -47,7 +47,7 @@ o Integrated all of your service/version detection fingerprints submitted from
telnet, and ftp to jute, bgp, and slurm. Highlights: telnet, and ftp to jute, bgp, and slurm. Highlights:
http://seclists.org/nmap-dev/2015/q2/171 [Daniel Miller] http://seclists.org/nmap-dev/2015/q2/171 [Daniel Miller]
o [NSE] Added 23 NSE scripts from 16 authors, bringing the total up to 493. o [NSE] Added 24 NSE scripts from 17 authors, bringing the total up to 494.
They are all listed at http://nmap.org/nsedoc/, and the summaries are below They are all listed at http://nmap.org/nsedoc/, and the summaries are below
(authors are listed in brackets): (authors are listed in brackets):
@@ -87,6 +87,10 @@ o [NSE] Added 23 NSE scripts from 16 authors, bringing the total up to 493.
+ http-vuln-cve2015-1635 detects Microsoft Windows systems vulnerable to + http-vuln-cve2015-1635 detects Microsoft Windows systems vulnerable to
MS15-034. [Paulino Calderon] MS15-034. [Paulino Calderon]
+ http-vuln-misfortune-cookie detects the "Misfortune Cookie" vulnerability
in Allegro RomPager 4.07, commonly used in SOHO routers for TR-069 access.
[Andrew Orr]
+ http-wordpress-plugins was renamed http-wordpress-enum and extended to + http-wordpress-plugins was renamed http-wordpress-enum and extended to
enumerate both plugins and themes of Wordpress installations and their enumerate both plugins and themes of Wordpress installations and their
versions. http-wordpress-enum is now http-wordpress-users. [Paulino Calderon] versions. http-wordpress-enum is now http-wordpress-users. [Paulino Calderon]

View File

@@ -238,6 +238,7 @@ Entry { filename = "http-vuln-cve2014-2128.nse", categories = { "safe", "vuln",
Entry { filename = "http-vuln-cve2014-2129.nse", categories = { "safe", "vuln", } } Entry { filename = "http-vuln-cve2014-2129.nse", categories = { "safe", "vuln", } }
Entry { filename = "http-vuln-cve2015-1427.nse", categories = { "intrusive", "vuln", } } Entry { filename = "http-vuln-cve2015-1427.nse", categories = { "intrusive", "vuln", } }
Entry { filename = "http-vuln-cve2015-1635.nse", categories = { "safe", "vuln", } } Entry { filename = "http-vuln-cve2015-1635.nse", categories = { "safe", "vuln", } }
Entry { filename = "http-vuln-misfortune-cookie.nse", categories = { "intrusive", "vuln", } }
Entry { filename = "http-vuln-wnr1000-creds.nse", categories = { "exploit", "intrusive", "vuln", } } Entry { filename = "http-vuln-wnr1000-creds.nse", categories = { "exploit", "intrusive", "vuln", } }
Entry { filename = "http-waf-detect.nse", categories = { "discovery", "intrusive", } } Entry { filename = "http-waf-detect.nse", categories = { "discovery", "intrusive", } }
Entry { filename = "http-waf-fingerprint.nse", categories = { "discovery", "intrusive", } } Entry { filename = "http-waf-fingerprint.nse", categories = { "discovery", "intrusive", } }