Nmap Development mailing list archives
New VA Modules: NSE: 1, OpenVAS: 2, MSF: 2, Nessus: 12
From: New VA Module Alert Service <postmaster () insecure org>
Date: Wed, 29 Jun 2011 10:00:35 -0700 (PDT)
This report describes any new scripts/modules/exploits added to Nmap, OpenVAS, Metasploit, and Nessus since yesterday. == Nmap Scripting Engine scripts (1) == r24454 http-barracuda-dir-traversal http://nmap.org/nsedoc/scripts/http-barracuda-dir-traversal.html Attempts to retrieve the configuration settings from the MySQL database dump on a Barracuda Networks Spam & Virus Firewall device using the directory traversal vulnerability in the "locale" parameter of "/cgi-mod/view_help.cgi" or "/cgi-bin/view_help.cgi". == OpenVAS plugins (2) == r11239 103184 gb_ManageEngine_ServiceDesk_Plus_48403.nasl http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_ManageEngine_ServiceDesk_Plus_48403.nasl?root=openvas&view=markup ManageEngine ServiceDesk Plus 'FILENAME' Parameter Directory Traversal Vulnerability r11239 103183 gb_ManageEngine_ServiceDesk_Plus_detect.nasl http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_ManageEngine_ServiceDesk_Plus_detect.nasl?root=openvas&view=markup ManageEngine ServiceDesk Plus Detection == Metasploit modules (2) == r13053 http://metasploit.com/redmine/projects/framework/repository/entry/modules/payloads/stagers/windows/reverse_http.rb Reverse HTTP Stager r13058 http://metasploit.com/redmine/projects/framework/repository/entry/modules/payloads/singles/generic/custom.rb Custom Payload == Nessus plugins (12) == 55454 ubuntu_USN-1160-1.nasl http://nessus.org/plugins/index.php?view=single&id=55454 USN-1160-1 : linux vulnerabilities 55453 suse_11_webkit-1_2_7-update-110622.nasl http://nessus.org/plugins/index.php?view=single&id=55453 SuSE Security Update: webkit-1.2.7-update (2011-06-22) 55452 redhat-RHSA-2011-0910.nasl http://nessus.org/plugins/index.php?view=single&id=55452 RHSA-2011-0910: ruby 55451 redhat-RHSA-2011-0909.nasl http://nessus.org/plugins/index.php?view=single&id=55451 RHSA-2011-0909: ruby 55450 redhat-RHSA-2011-0908.nasl http://nessus.org/plugins/index.php?view=single&id=55450 RHSA-2011-0908: irb 55449 manageengine_supportcenter_path_traversal.nasl http://nessus.org/plugins/index.php?view=single&id=55449 ManageEngine SupportCenter Plus FileDownload.jsp path Parameter Traversal Arbitrary File Access 55448 manageengine_supportcenter_default_creds.nasl http://nessus.org/plugins/index.php?view=single&id=55448 ManageEngine SupportCenter Plus Default Administrator Credentials 55447 manageengine_supportcenter_detect.nasl http://nessus.org/plugins/index.php?view=single&id=55447 ManageEngine SupportCenter Plus Detection 55446 manageengine_servicedesk_FILENAME_traversal.nasl http://nessus.org/plugins/index.php?view=single&id=55446 ManageEngine ServiceDesk Plus FileDownload.jsp FILENAME Parameter Traversal Arbitrary File Access 55445 manageengine_servicedesk_default_creds.nasl http://nessus.org/plugins/index.php?view=single&id=55445 ManageEngine ServiceDesk Plus Default Administrator Credentials 55444 manageengine_servicedesk_detect.nasl http://nessus.org/plugins/index.php?view=single&id=55444 ManageEngine ServiceDesk Plus Detection 55443 wptouch_redirect.nasl http://nessus.org/plugins/index.php?view=single&id=55443 WPtouch Plugin for WordPress wptouch_redirect Parameter URL Redirection _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- New VA Modules: NSE: 1, OpenVAS: 2, MSF: 2, Nessus: 12 New VA Module Alert Service (Jun 29)