-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
c6d5e89
commit dbb64c1
Showing
1 changed file
with
19 additions
and
7 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -227,6 +227,7 @@ Corrected a badly constracted file which could have allowed treating of | |
CPE = "cpe:/a:mapp:webtrekk:"; | ||
cpe = "cpe:/a:mitre:ovaldi"; | ||
CPE = "cpe:/a:netsparker:wass"; | ||
CPE = "cpe:/a:tawk:tawk.to_live_chat"; | ||
CPU' could have occured because a retry loop continually finds the same | ||
crafted IFF ILBM file. NOTE: some of these details are obtained from | ||
crapData = string("ALLO ", crap(length: 25000),"\r\n"); | ||
|
@@ -361,6 +362,7 @@ extended EAP-SIM/AKA fast re-authentication to allow use with FILS | |
# Fedora Update for tre FEDORA-2016-0a952a3bc0 | ||
# Fedora Update for tre FEDORA-2016-0ff6c3d84b | ||
# Fedora Update for tre FEDORA-2016-cd09eab674 | ||
Festplatten- und Dateiverschluesselung eingesetzt werden. Alternativ SOLLTE 'dm-crypt' in | ||
files. If a user were tricked into opening a specially-crafted CAF file, a | ||
files to potentially execute code and it is tracked by the Mitre CVE | ||
file_xml = '\t\t<file_item' + status + ' xmlns="http://oval.mitre.org/XMLSchema/' + | ||
|
@@ -475,12 +477,11 @@ if( model =~ '^TE[3456]0' && revcomp( a: version, b: "v600r006c00spc500" ) < 0 ) | |
if "nvd.nist.gov/vuln/detail/CVE-" in match.group(2) or "cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-" in match.group(2): | ||
if("petite annonce" >< res && ">DEPOSER UNE ANNONCE<" >< res) { | ||
if ("presse" >< res1) { | ||
if (prod == "BMX NOC 0401" || prod == "BMX NOE 0100" || prod = "BMX NOE 0110" || prod == "BMX NOE 0110H" || | ||
if (prod == "BMX NOC 0401" || prod == "BMX NOE 0100" || prod == "BMX NOE 0110" || prod == "BMX NOE 0110H" || | ||
if (prod == "BMX NOE 0100") { | ||
if (prod == "BMX NOE 0100" || prod == "BMX NOE 0100H") { | ||
if (prod == "BMX NOE 0110") { | ||
if (prod == "BMX NOE 0110" || prod == "BMX NOE 0110H") { | ||
if (prod =~ "^BMX\s*NOC\s*0401$" || prod =~ "^BMX\s*NOE\s*0100$" || prod =~ "^BMX\s*NOE\s*0110$" || prod =~ "^BMX\s*NOE\s*0110H$" || | ||
if (prod =~ "^BMX\s*NOE\s*0100$") { | ||
if (prod =~ "^BMX\s*NOE\s*0100$" || prod =~ "^BMX\s*NOE\s*0100H$") { | ||
if (prod =~ "^BMX\s*NOE\s*0110$") { | ||
if (prod =~ "^BMX\s*NOE\s*0110$" || prod =~ "^BMX\s*NOE\s*0110H$") { | ||
if( r =~ " (A\. A\. Milne|Albert Einstein|Anonimo|Antico proverbio cinese|Autor desconocido|Charles Dickens|Francisco de Quevedo y Villegas|George Bernard Shaw|Jaime Balmes|Johann Wolfgang von Goethe|Jil Sander|Juana de Asbaje|Konfucius|Lord Philip Chesterfield|Montaigne|Petrarca|Ralph Waldo Emerson|Seneca|Syrus|Werner von Siemens)" || | ||
if(rcvRes && '>iAm[i]nE<' >< rcvRes) | ||
if( res =~ "^HTTP/1\.[01] 200" && "Powered by" >< res && "ANG" >< res ) { | ||
|
@@ -576,6 +577,7 @@ Jouni Knuutinen from Synopsys discovered flaws in the Samba DCE-RPC code which c | |
key = "HostDetails/Cert/" + fpr + "/"; | ||
keyserv 100029 keyserver | ||
"keyserver", | ||
kJtP0F6mv/Afe/5s7yd3ZJ/72yT73NjLg0vWbmLkop6eOR+CKw4nxorWxpocAj0p | ||
# Kubernetes Dashboard Public WAN (Internet) Accessible | ||
L3: conring size for XEN HV's with huge memory to small. Inital Xen logs | ||
leaks because of a missing check when transfering pages via | ||
|
@@ -617,7 +619,7 @@ MM]7>[YM~GC^@?_WK0@W/F>UDL^Q8<TQ^+LTL*)6UG-,[V6-;N*W*79^&[ND/ | |
MN*W*79^&[ND/.DM''*U8D?Q:.'+%RB;S$!.'6['*(;8>~A:>&GO>&&M7/36X | ||
model = "TE Unknown Model"; | ||
mod = eregmatch(pattern: "Huawei (TE[0-9]0)", string: banner); | ||
mod = eregmatch( pattern:"var Model(Nmae|Name) = '(EDR-[^']+)';", string:buf ); | ||
mod = eregmatch( pattern:"var Model(Nmae|Name) = '(EDR-[^']+)';", string:res ); | ||
# Modified by Tim Brown <[email protected]> | ||
* Mon Aug 17 2009 Remi Collet 1.02.1-3 | ||
* Mon Jan 26 2009 Remi Collet - 0.71.4-1 | ||
|
@@ -793,6 +795,7 @@ RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an authenticated, remot | |
- S8168728, CVE-2016-5548: DSA signing improvments | ||
SAML/CAS tokens in the session database, an attacker can open an anonymous | ||
* Sat May 30 2009 Remi Collet 1.02.1-1 | ||
- SCALANCE M876-4 (NAM) (All versions < V7.1.2) | ||
script_add_preference(name:"Delete hash test Programm after the test", type:"checkbox", value:"yes", id:3); | ||
script_add_preference(name:"Install hash test Programm on the Target", type:"checkbox", value:"no", id:2); | ||
script_add_preference(name:"Mark unrechable Hosts as dead (not scanning)", type:"checkbox", value:"yes", id:5); # nb: Don't change this name and id, these are hardcoded / used in GVMd | ||
|
@@ -861,6 +864,7 @@ SAML/CAS tokens in the session database, an attacker can open an anonymous | |
script_name("Wireshark Steam IHS Discovery/CoAP Dissector DoS Vulnerabilities (Mac OS X)"); | ||
script_name("Wireshark Steam IHS Discovery/CoAP Dissector DoS Vulnerabilities (Windows)"); | ||
script_name("WordPress Annonces Plugin 'abspath' Parameter RFI Vulnerability"); | ||
script_name("WordPress Tawk.To Live Chat Plugin < 0.6.0 Broken Access Control Vulnerability"); | ||
* scripts/CAs.inc: | ||
script_tag(name:"affected", value:"Apple Mac OS X Big Sur versions 11.x before | ||
script_tag(name:"affected", value:"BA SYSTEMS BAS Web on BAS920 devices with | ||
|
@@ -875,6 +879,7 @@ SAML/CAS tokens in the session database, an attacker can open an anonymous | |
script_tag(name:"affected", value:"Visicom Medias AceFTP Freeware/Pro Version 3.80.3 and prior on Windows."); | ||
script_tag(name:"affected", value:"WAN Emulator 2.3 is vulnerable. Other versions may also be affected."); | ||
script_tag(name:"affected", value:"WordPress Annonces plugin 1.2.0.0 is vulnerable. Other versions | ||
script_tag(name:"affected", value:"WordPress Tawk.To Live Chat plugin prior to version 0.6.0."); | ||
script_tag(name:"impact", value:"A successful exploit could allow the attacker to cause the wireless WAN (WWAN) | ||
script_tag(name:"impact", value:"Successful exploit could allow an unauthenticated, remote attacker to cause an affected device to start dropping legitimate IPv6 neighbors as legitimate ND times out, leading to DOS."); | ||
script_tag(name:"impact", value:"The use of flate.NewReader in crewjam/saml does not limit the | ||
|
@@ -990,19 +995,22 @@ SAML/CAS tokens in the session database, an attacker can open an anonymous | |
script_tag(name:"summary", value:"The remote host is missing an update for the 'tre' | ||
script_tag(name:"summary", value:"The remote host is missing an update to nd | ||
script_tag(name:"summary", value:"The WordPress plugin 'Annonces' is prone to a remote file | ||
script_tag(name:"summary", value:"The WordPress plugin 'Tawk.To Live Chat' is prone to a broken | ||
script_tag(name:"summary", value:"Tim McLean discovered that pyjwt, a Python implementation of JSON Web | ||
script_tag(name:"summary", value:"WAN Emulator is prone to a remote command-execution vulnerability because | ||
script_tag(name:"summary", value:"Wen Bin discovered that bchunk, an application that converts a CD | ||
script_tag(name:"summary", value:"Ziel des Bausteins SYS.2.2.3 ist der Schutz von Informationen, | ||
script_tag(name:"vuldetect", value:"Checks if the Swarmpit UI is accessible from a public WAN | ||
script_xref(name:"URL", value:"http://cpe.mitre.org/"); | ||
script_xref(name:"URL", value:"https://cwe.mitre.org/data/definitions/319.html"); | ||
script_xref(name:"URL", value:"https://github.com/soheilsamanabadi/vulnerabilitys/pull/1"); | ||
script_xref(name:"URL", value:"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10184"); | ||
script_xref(name:"URL", value:"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A447"); | ||
script_xref(name:"URL", value:"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9894"); | ||
script_xref(name:"URL", value:"https://packetstormsecurity.com/files/130797/raritanpoweriq-staticsecret.txt"); | ||
script_xref(name:"URL", value:"https://ths.sh/posts/zoomzoo/"); | ||
script_xref(name:"URL", value:"https://wordpress.org/plugins/annonces/"); | ||
script_xref(name:"URL", value:"https://www.bsi.bund.de/EN/Themen/Unternehmen-und-Organisationen/Cyber-Sicherheitslage/Reaktion/CERT-Bund/CERT-Bund-Reports/HowTo/Offene-Portmapper-Dienste/Offene-Portmapper-Dienste.html"); | ||
script_xref(name:"URL", value:"https://www.bsi.bund.de/EN/Themen/Unternehmen-und-Organisationen/Cyber-Sicherheitslage/Reaktion/CERT-Bund/CERT-Bund-Reports/HowTo/Offene-Sphinx-Server/Offene-Sphinx-Server_node.html"); | ||
script_xref(name:"URL", value:"https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/TechGuidelines/TR03111/BSI-TR-03111_V-2-0_pdf.pdf"); | ||
script_xref(name:"URL", value:"https://www.synacktiv.com/ressources/advisories/GLPI_9.4.0_stored_XSS.pdf"); | ||
|
@@ -1011,6 +1019,7 @@ SAML/CAS tokens in the session database, an attacker can open an anonymous | |
script_xref(name:"URL", value:"https://www.synacktiv.com/ressources/advisories/WordPress_Duplicator-1.2.40-RCE.pdf"); | ||
script_xref(name:"URL", value:"https://www.synopsys.com/blogs/software-security/cve-2018-18907/"); | ||
script_xref(name:"URL", value:"https://www.synopsys.com/blogs/software-security/cyrc-advisory-nagios-xi/"); | ||
script_xref(name:"URL", value:"https://www.synopsys.com/blogs/software-security/cyrc-vulnerability-advisory-cve-2023-2453.html"); | ||
script_xref(name:"URL", value:"https://www.synopsys.com/blogs/software-security/opentsdb/"); | ||
script_xref(name:"URL", value:"https://www.synopsys.com/blogs/software-security/path-traversal-defects-oracles-jsf2-implementation/"); | ||
script_xref(name:"URL", value:"http://tigger.uic.edu/~jlongs2/holes/cups2.txt"); | ||
|
@@ -1077,6 +1086,7 @@ send(socket: soc, data: triggerD); | |
service accessible from a public WAN (Internet) / public LAN."); | ||
service_register( port:port, proto:"agobot.fo" ); | ||
service_report( port:port, svc:"agobot.fo", banner:banner ); | ||
services (found in logs, referers, caches, etc...)"); | ||
SessionTicket extention and ECDHE-ECDSA (bsc#1015499). | ||
set_kb_item(name: "aas/detected", value: TRUE); | ||
set_kb_item(name: "aas/http/detected", value: TRUE); | ||
|
@@ -1152,6 +1162,7 @@ systems with HDA sound needing MSI support were added to the quirks | |
take priviliges into account for the connecting user, | ||
"TANQ PRODUTO" >< res || "TANK PRODUKT" >< res || "REC 90" >< res || | ||
# Tarik El-Yassem <[email protected]> | ||
"tawkto-live-chat/readme.txt", "Tawk.To Live Chat#---#=== Tawk\.To Live Chat#---#Stable tag: ([0-9.]+)#---#cpe:/a:tawk:tawk.to_live_chat", | ||
## TC and CE affected but pattern coming like(TE) | ||
TCP 1005 Theef | ||
TCP 1040 Medias, Sedepex | ||
|
@@ -1381,6 +1392,7 @@ Work around CVE-2019-11059 by disabling 64Bit descritptor size | |
- x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088)."); | ||
- xen/x86/entry/64: Do not use IST entry for #BP stack (bsc#1087088). | ||
- Xephyr: Fix broken image when endianess of client machine and | ||
xmLgZFfN5a3bNlG8wHS1vMd3Gcpq2iaN5muwBMHSbANR7WF0HE8Snrdkx5xfd+tE | ||
'xmlns:linux-sc="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5#linux" ', | ||
'xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5" ', | ||
'xmlns:oval-sc="http://oval.mitre.org/XMLSchema/oval-system-characteristics-5" ', | ||
|