Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

nmap2ivil leak #588

alirezakv opened this issue Oct 20, 2017 · 0 comments

nmap2ivil leak #588

alirezakv opened this issue Oct 20, 2017 · 0 comments


Copy link

@alirezakv alirezakv commented Oct 20, 2017

when running nmap scans which execute nmap scripts, this leakage happens. The id of last script on previous port will be assigned to the new port.
so something like this:
<port>22 <script>ssh-enum</script></port>
<port>25 <script>smtp-enum</script></port>
will result to 4 findings in seccubus:
ports -> 22 -> ...
ssh-enum -> 22 -> ...
ssh-enum -> 25 -> ... this is wrong!
smtp-enum -> 25 -> ...

A patch is attached here.


alirezakv pushed a commit to alirezakv/Seccubus that referenced this issue Nov 27, 2017
@MrSeccubus MrSeccubus closed this in e04851f Dec 7, 2017
MrSeccubus added a commit that referenced this issue Dec 7, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
None yet
None yet
Linked pull requests

Successfully merging a pull request may close this issue.

None yet
1 participant