Nmap Development mailing list archives

New VA Modules: OpenVAS: 5, MSF: 2, Nessus: 1


From: New VA Module Alert Service <postmaster () insecure org>
Date: Mon, 22 Aug 2011 10:00:44 -0700 (PDT)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== OpenVAS plugins (5) ==

r11483 103215 gb_bugzilla_49042.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_bugzilla_49042.nasl?root=openvas&view=markup
Bugzilla Multiple Security Vulnerabilities

r11483 103216 gb_otrs_49251.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_otrs_49251.nasl?root=openvas&view=markup
OTRS 'AdminPackageManager.pm' Local File Disclosure Vulnerability

r11483 103219 gb_freefloat_ftpd_49265.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_freefloat_ftpd_49265.nasl?root=openvas&view=markup
Freefloat FTP Server 'ALLO' Command Remote Buffer Overflow Vulnerability

r11483 103217 gb_phpMyRealty_49250.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_phpMyRealty_49250.nasl?root=openvas&view=markup
phpMyRealty 'seed' Parameter SQL Injection Vulnerability

r11483 103218 gb_wordpress_49259.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_wordpress_49259.nasl?root=openvas&view=markup
WordPress UnGallery 'source_vuln.php' Local File Disclosure
Vulnerability

== Metasploit modules (2) ==

r13606 http://metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/bnat/bnat_router.rb
BNAT Router

r13608 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/gather/credentials/windows_autologin.rb
Windows Gather AutoLogin User Credential Extractor

== Nessus plugins (1) ==

55924 centos_RHSA-2011-1187.nasl
http://nessus.org/plugins/index.php?view=single&id=55924
CentOS : RHSA-2011-1187
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: