Nmap Development mailing list archives

New VA Modules: OpenVAS: 35, Nessus: 29


From: New VA Module Alert Service <postmaster () insecure org>
Date: Fri, 14 Oct 2011 10:02:47 -0700 (PDT)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== OpenVAS plugins (35) ==

r11799 103300 gb_wordpress_50080.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_wordpress_50080.nasl?root=openvas&view=markup
WordPress Light Post Plugin 'abspath' Parameter Remote File Include
Vulnerability

r11800 802180 gb_mozilla_prdts_mult_vuln_macosx_oct11.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_vuln_macosx_oct11.nasl?root=openvas&view=markup
Mozilla Products Multiple Vulnerabilities - Oct 2011 (MAC OS X)

r11800 802187 gb_mozilla_prdts_load_subscript_sec_bypass_vuln_macosx.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_mozilla_prdts_load_subscript_sec_bypass_vuln_macosx.nasl?root=openvas&view=markup
Mozilla Firefox and SeaMonkey 'loadSubScript()' Security Bypass
Vulnerability (MAC OS X)

r11800 802040 gb_mybb_mystatus_plugin_statid_sql_inj_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_mybb_mystatus_plugin_statid_sql_inj_vuln.nasl?root=openvas&view=markup
MyBB MyStatus Plugin process-mystatus.php 'statid' Parameter SQL
Injection Vulnerability

r11800 802253 gb_coldcalendar_eventid_sql_inj_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_coldcalendar_eventid_sql_inj_vuln.nasl?root=openvas&view=markup
ColdGen ColdCalendar 'EventID' SQL Injection Vulnerability

r11800 801993 gb_ssh_authentication_bypass_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_ssh_authentication_bypass_vuln.nasl?root=openvas&view=markup
SSH SSH-1 Protocol Authentication Bypass Vulnerability

r11800 863581 gb_fedora_2011_13801_phpPgAdmin_fc15.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_fedora_2011_13801_phpPgAdmin_fc15.nasl?root=openvas&view=markup
Fedora Update for phpPgAdmin FEDORA-2011-13801

r11800 802177 gb_plotsoft_pdfill_pdf_editor_untrusted_search_path_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_plotsoft_pdfill_pdf_editor_untrusted_search_path_vuln.nasl?root=openvas&view=markup
PlotSoft PDFill PDF Editor Untrusted Search Path Vulnerability

r11800 802038 gb_mybb_forum_userbar_plugin_sql_inj_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_mybb_forum_userbar_plugin_sql_inj_vuln.nasl?root=openvas&view=markup
MyBB Userbar Plugin 'userbarsettings.php' SQL Injection Vulnerability

r11800 802179 gb_mozilla_prdts_detect_macosx.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_mozilla_prdts_detect_macosx.nasl?root=openvas&view=markup
Mozilla Products Version Detection (Mac OS X)

r11800 802182 gb_mozilla_prdts_browser_engine_mult_vuln_macosx.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_mozilla_prdts_browser_engine_mult_vuln_macosx.nasl?root=openvas&view=markup
Mozilla Products Browser Engine Multiple Unspecified Vulnerabilities
(MAC OS X)

r11800 802178 gb_plotsoft_pdfill_pdf_editor_detect.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_plotsoft_pdfill_pdf_editor_detect.nasl?root=openvas&view=markup
PlotSoft PDFill PDF Editor Version Detection

r11800 802184 gb_mozilla_prdts_yarr_code_exec_vuln_macosx.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_mozilla_prdts_yarr_code_exec_vuln_macosx.nasl?root=openvas&view=markup
Mozilla Products 'YARR' Code Execution Vulnerability (MAC OS X)

r11800 840770 gb_ubuntu_USN_1230_1.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_ubuntu_USN_1230_1.nasl?root=openvas&view=markup
Ubuntu Update for quassel USN-1230-1

r11800 863583 gb_fedora_2011_13864_openswan_fc14.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_fedora_2011_13864_openswan_fc14.nasl?root=openvas&view=markup
Fedora Update for openswan FEDORA-2011-13864

r11800 863579 gb_fedora_2011_13860_cyrus-imapd_fc15.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_fedora_2011_13860_cyrus-imapd_fc15.nasl?root=openvas&view=markup
Fedora Update for cyrus-imapd FEDORA-2011-13860

r11800 801992 gb_smartftp_client_filenames_unspecified_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_smartftp_client_filenames_unspecified_vuln.nasl?root=openvas&view=markup
SmartFTP Filename Processing Unspecified Vulnerability

r11800 840771 gb_ubuntu_USN_1228_1.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_ubuntu_USN_1228_1.nasl?root=openvas&view=markup
Ubuntu Update for linux-ti-omap4 USN-1228-1

r11800 831467 gb_mandriva_MDVA_2011_057.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2011_057.nasl?root=openvas&view=markup
Mandriva Update for rpm MDVA-2011:057 (rpm)

r11800 802181 gb_mozilla_firefox_mem_corrpt_n_int_underflow_vuln_macosx.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_mozilla_firefox_mem_corrpt_n_int_underflow_vuln_macosx.nasl?root=openvas&view=markup
Mozilla Firefox Memory Corruption and Integer Underflow Vulnerabilities
(MAC OS X)

r11800 802183 gb_mozilla_prdts_sec_bypass_vuln_macosx.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_mozilla_prdts_sec_bypass_vuln_macosx.nasl?root=openvas&view=markup
Mozilla Products Same Origin Policy Bypass Vulnerability (MAC OS X)

r11800 802185 gb_mozilla_prdts_dialog_bypass_n_use_after_free_mem_crptn_vuln_macosx.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_mozilla_prdts_dialog_bypass_n_use_after_free_mem_crptn_vuln_macosx.nasl?root=openvas&view=markup
Mozilla Products Enter Key Dialog Bypass and Use-After-Free Memory
Corruption Vulnerabilities (MAC OS X)

r11800 863584 gb_fedora_2011_13805_phpPgAdmin_fc14.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_fedora_2011_13805_phpPgAdmin_fc14.nasl?root=openvas&view=markup
Fedora Update for phpPgAdmin FEDORA-2011-13805

r11800 831465 gb_mandriva_MDVSA_2011_146.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_146.nasl?root=openvas&view=markup
Mandriva Update for cups MDVSA-2011:146 (cups)

r11800 831466 gb_mandriva_MDVSA_2011_148.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_148.nasl?root=openvas&view=markup
Mandriva Update for samba MDVSA-2011:148 (samba)

r11800 802254 gb_coldusergroup_xss_n_sql_inj_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_coldusergroup_xss_n_sql_inj_vuln.nasl?root=openvas&view=markup
ColdGen ColdUserGroup Cross-Site Scripting and SQL Injection
Vulnerabilities

r11800 863582 gb_fedora_2011_13862_openswan_fc15.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_fedora_2011_13862_openswan_fc15.nasl?root=openvas&view=markup
Fedora Update for openswan FEDORA-2011-13862

r11800 870500 gb_RHSA-2011_1371-01_pidgin.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_RHSA-2011_1371-01_pidgin.nasl?root=openvas&view=markup
RedHat Update for pidgin RHSA-2011:1371-01

r11800 802186 gb_mozilla_prdts_mult_vuln_macosx.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_mozilla_prdts_mult_vuln_macosx.nasl?root=openvas&view=markup
Mozilla Products Multiple Vulnerabilities - (MAC OS X)

r11800 840773 gb_ubuntu_USN_1227_1.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_ubuntu_USN_1227_1.nasl?root=openvas&view=markup
Ubuntu Update for linux USN-1227-1

r11800 840772 gb_ubuntu_USN_1229_1.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_ubuntu_USN_1229_1.nasl?root=openvas&view=markup
Ubuntu Update for postgresql-8.4 USN-1229-1

r11800 802039 gb_mybb_afsignatures_plugin_sql_inj_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_mybb_afsignatures_plugin_sql_inj_vuln.nasl?root=openvas&view=markup
MyBB Advanced Forum Signatures (afsignatures) Plugin 'signature.php' SQL
Injection Vulnerability

r11800 801991 gb_ms_windows_smb_share_passwd_null_sec_bypass_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_ms_windows_smb_share_passwd_null_sec_bypass_vuln.nasl?root=openvas&view=markup
Microsoft Windows SMB/NETBIOS NULL Session Authentication Bypass
Vulnerability

r11800 863580 gb_fedora_2011_13785_rpm_fc15.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_fedora_2011_13785_rpm_fc15.nasl?root=openvas&view=markup
Fedora Update for rpm FEDORA-2011-13785

r11800 863585 gb_fedora_2011_13869_cyrus-imapd_fc14.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_fedora_2011_13869_cyrus-imapd_fc14.nasl?root=openvas&view=markup
Fedora Update for cyrus-imapd FEDORA-2011-13869

== Nessus plugins (29) ==

56508 vmware_VMSA-2011-0012.nasl
http://nessus.org/plugins/index.php?view=single&id=56508
VMSA-2011-0012 : VMware ESXi and ESX updates to third party libraries
and ESX Service Console

56507 ubuntu_USN-1230-1.nasl
http://nessus.org/plugins/index.php?view=single&id=56507
USN-1230-1 : quassel vulnerability

56506 ubuntu_USN-1229-1.nasl
http://nessus.org/plugins/index.php?view=single&id=56506
USN-1229-1 : postgresql-8.3, postgresql-8.4 vulnerability

56505 redhat-RHSA-2011-1371.nasl
http://nessus.org/plugins/index.php?view=single&id=56505
RHSA-2011-1371: finch

56504 gentoo_GLSA-201110-11.nasl
http://nessus.org/plugins/index.php?view=single&id=56504
GLSA-201110-11 : Adobe Flash Player: Multiple vulnerabilities

56503 gentoo_GLSA-201110-10.nasl
http://nessus.org/plugins/index.php?view=single&id=56503
GLSA-201110-10 : Wget: User-assisted file creation or overwrite

56502 gentoo_GLSA-201110-09.nasl
http://nessus.org/plugins/index.php?view=single&id=56502
GLSA-201110-09 : Conky: Privilege escalation

56501 gentoo_GLSA-201110-08.nasl
http://nessus.org/plugins/index.php?view=single&id=56501
GLSA-201110-08 : feh: Multiple vulnerabilities

56500 freebsd_pkg_e595e170677111dc8be802e0185f8d72.nasl
http://nessus.org/plugins/index.php?view=single&id=56500
FreeBSD : openoffice -- arbitrary command execution vulnerability
(e595e170-6771-11dc-8be8-02e0185f8d72)

56499 freebsd_pkg_da3d381b0ee611e0becc0022156e8794.nasl
http://nessus.org/plugins/index.php?view=single&id=56499
FreeBSD : pecl-phar -- format string vulnerability
(da3d381b-0ee6-11e0-becc-0022156e8794)

56498 freebsd_pkg_d7cd501508c911dabc080001020eed82.nasl
http://nessus.org/plugins/index.php?view=single&id=56498
FreeBSD : gforge -- XSS and email flood vulnerabilities
(d7cd5015-08c9-11da-bc08-0001020eed82)

56497 freebsd_pkg_d337b206200f11dca1970011098b2f36.nasl
http://nessus.org/plugins/index.php?view=single&id=56497
FreeBSD : xpcd -- buffer overflow (d337b206-200f-11dc-a197-0011098b2f36)

56496 freebsd_pkg_d177d9f9e31711d9808800123f0f7307.nasl
http://nessus.org/plugins/index.php?view=single&id=56496
FreeBSD : nwclient -- multiple vulnerabilities
(d177d9f9-e317-11d9-8088-00123f0f7307)

56495 freebsd_pkg_a89b76a7f6bd11dd94d90030843d3802.nasl
http://nessus.org/plugins/index.php?view=single&id=56495
FreeBSD : amaya -- multiple buffer overflow vulnerabilities
(a89b76a7-f6bd-11dd-94d9-0030843d3802)

56494 freebsd_pkg_9855ac8e2aec11dba6e2000e0c2e438a.nasl
http://nessus.org/plugins/index.php?view=single&id=56494
FreeBSD : alsaplayer -- multiple vulnerabilities
(9855ac8e-2aec-11db-a6e2-000e0c2e438a)

56493 freebsd_pkg_641e8609cab511d99aed000e0c2e438a.nasl
http://nessus.org/plugins/index.php?view=single&id=56493
FreeBSD : ppxp -- local root exploit
(641e8609-cab5-11d9-9aed-000e0c2e438a)

56492 freebsd_pkg_5486669eea9f11debd9c00215c6a37bb.nasl
http://nessus.org/plugins/index.php?view=single&id=56492
FreeBSD : tptest -- pwd Remote Stack Buffer Overflow
(5486669e-ea9f-11de-bd9c-00215c6a37bb)

56491 freebsd_pkg_49ad1bf85d7e11d880e30020ed76ef5a.nasl
http://nessus.org/plugins/index.php?view=single&id=56491
FreeBSD : ChiTeX/ChiLaTeX unsafe set-user-id root
(49ad1bf8-5d7e-11d8-80e3-0020ed76ef5a)

56490 freebsd_pkg_402ae71026a211ddae05825f4c35000a.nasl
http://nessus.org/plugins/index.php?view=single&id=56490
FreeBSD : peercast -- arbitrary code execution
(402ae710-26a2-11dd-ae05-825f4c35000a)

56489 fedora_2011-13869.nasl
http://nessus.org/plugins/index.php?view=single&id=56489
Fedora 14 2011-13869

56488 fedora_2011-13864.nasl
http://nessus.org/plugins/index.php?view=single&id=56488
Fedora 14 2011-13864

56487 fedora_2011-13862.nasl
http://nessus.org/plugins/index.php?view=single&id=56487
Fedora 15 2011-13862

56486 fedora_2011-13860.nasl
http://nessus.org/plugins/index.php?view=single&id=56486
Fedora 15 2011-13860

56485 cisco_uom_8_6.nasl
http://nessus.org/plugins/index.php?view=single&id=56485
Cisco Unified Operations Manager < 8.6 Multiple Vulnerabilities

56484 cisco_uom_detect.nasl
http://nessus.org/plugins/index.php?view=single&id=56484
Cisco Unified Operations Manager Detection

56483 safari_5_1_1.nasl
http://nessus.org/plugins/index.php?view=single&id=56483
Safari < 5.1.1 Multiple Vulnerabilities

56482 macosx_Safari5_1_1.nasl
http://nessus.org/plugins/index.php?view=single&id=56482
Mac OS X : Safari < 5.1.1

56481 macosx_SecUpd2011-006.nasl
http://nessus.org/plugins/index.php?view=single&id=56481
Mac OS X Multiple Vulnerabilities (Security Update 2011-006)

56480 macosx_10_7_2.nasl
http://nessus.org/plugins/index.php?view=single&id=56480
Mac OS X 10.7 < 10.7.2
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: