Nmap Development mailing list archives

New VA Modules: NSE: 1, OpenVAS: 2, MSF: 2, Nessus: 12


From: New VA Module Alert Service <postmaster () insecure org>
Date: Wed, 29 Jun 2011 10:00:35 -0700 (PDT)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== Nmap Scripting Engine scripts (1) ==

r24454 http-barracuda-dir-traversal http://nmap.org/nsedoc/scripts/http-barracuda-dir-traversal.html
Attempts to retrieve the configuration settings from the MySQL database
dump on a Barracuda Networks Spam & Virus Firewall device using the
directory traversal vulnerability in the "locale" parameter of
"/cgi-mod/view_help.cgi" or "/cgi-bin/view_help.cgi".

== OpenVAS plugins (2) ==

r11239 103184 gb_ManageEngine_ServiceDesk_Plus_48403.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_ManageEngine_ServiceDesk_Plus_48403.nasl?root=openvas&view=markup
ManageEngine ServiceDesk Plus 'FILENAME' Parameter Directory Traversal
Vulnerability

r11239 103183 gb_ManageEngine_ServiceDesk_Plus_detect.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_ManageEngine_ServiceDesk_Plus_detect.nasl?root=openvas&view=markup
ManageEngine ServiceDesk Plus Detection

== Metasploit modules (2) ==

r13053 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/payloads/stagers/windows/reverse_http.rb
Reverse HTTP Stager

r13058 http://metasploit.com/redmine/projects/framework/repository/entry/modules/payloads/singles/generic/custom.rb
Custom Payload

== Nessus plugins (12) ==

55454 ubuntu_USN-1160-1.nasl
http://nessus.org/plugins/index.php?view=single&id=55454
USN-1160-1 : linux vulnerabilities

55453 suse_11_webkit-1_2_7-update-110622.nasl
http://nessus.org/plugins/index.php?view=single&id=55453
SuSE Security Update: webkit-1.2.7-update (2011-06-22)

55452 redhat-RHSA-2011-0910.nasl
http://nessus.org/plugins/index.php?view=single&id=55452
RHSA-2011-0910: ruby

55451 redhat-RHSA-2011-0909.nasl
http://nessus.org/plugins/index.php?view=single&id=55451
RHSA-2011-0909: ruby

55450 redhat-RHSA-2011-0908.nasl
http://nessus.org/plugins/index.php?view=single&id=55450
RHSA-2011-0908: irb

55449 manageengine_supportcenter_path_traversal.nasl
http://nessus.org/plugins/index.php?view=single&id=55449
ManageEngine SupportCenter Plus FileDownload.jsp path Parameter
Traversal Arbitrary File Access

55448 manageengine_supportcenter_default_creds.nasl
http://nessus.org/plugins/index.php?view=single&id=55448
ManageEngine SupportCenter Plus Default Administrator Credentials

55447 manageengine_supportcenter_detect.nasl
http://nessus.org/plugins/index.php?view=single&id=55447
ManageEngine SupportCenter Plus Detection

55446 manageengine_servicedesk_FILENAME_traversal.nasl
http://nessus.org/plugins/index.php?view=single&id=55446
ManageEngine ServiceDesk Plus FileDownload.jsp FILENAME Parameter
Traversal Arbitrary File Access

55445 manageengine_servicedesk_default_creds.nasl
http://nessus.org/plugins/index.php?view=single&id=55445
ManageEngine ServiceDesk Plus Default Administrator Credentials

55444 manageengine_servicedesk_detect.nasl
http://nessus.org/plugins/index.php?view=single&id=55444
ManageEngine ServiceDesk Plus Detection

55443 wptouch_redirect.nasl
http://nessus.org/plugins/index.php?view=single&id=55443
WPtouch Plugin for WordPress wptouch_redirect Parameter URL Redirection
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: