Nmap Development mailing list archives

New VA Modules: OpenVAS: 9, Nessus: 8


From: New VA Module Alert Service <postmaster () insecure org>
Date: Wed, 23 Nov 2011 10:01:08 -0800 (PST)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== OpenVAS plugins (9) ==

r12171 802343 gb_chasen_bof_vuln_win.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_chasen_bof_vuln_win.nasl?root=openvas&view=markup
ChaSen Buffer Overflow Vulnerability (Windows)

r12171 902636 secpod_google_chrome_v8_remote_code_exec_vuln_lin.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_google_chrome_v8_remote_code_exec_vuln_lin.nasl?root=openvas&view=markup
Google Chrome V8 Remote Code Execution Vulnerability (Linux)

r12171 902585 secpod_phpmyadmin_setup_interface_xss_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_phpmyadmin_setup_interface_xss_vuln.nasl?root=openvas&view=markup
phpMyAdmin Setup Interface Cross Site Scripting Vulnerability

r12171 802344 gb_chasen_bof_vuln_lin.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_chasen_bof_vuln_lin.nasl?root=openvas&view=markup
ChaSen Buffer Overflow Vulnerability (Lindows)

r12171 902637 secpod_google_chrome_v8_remote_code_exec_vuln_macosx.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_google_chrome_v8_remote_code_exec_vuln_macosx.nasl?root=openvas&view=markup
Google Chrome V8 Remote Code Execution Vulnerability (Mac OS X)

r12171 902588 secpod_ms_windows_ip_validation_code_exec_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_ms_windows_ip_validation_code_exec_vuln.nasl?root=openvas&view=markup
Microsoft Windows Internet Protocol Validation Remote Code Execution
Vulnerability

r12171 902589 secpod_goahead_webserver_mult_xss_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_goahead_webserver_mult_xss_vuln.nasl?root=openvas&view=markup
GoAhead WebServer 'name' and 'address' Cross-Site Scripting
Vulnerabilities

r12171 902635 secpod_google_chrome_v8_remote_code_exec_vuln_win.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_google_chrome_v8_remote_code_exec_vuln_win.nasl?root=openvas&view=markup
Google Chrome V8 Remote Code Execution Vulnerability (Windows)

r12171 902760 secpod_clamav_recursion_dos_vuln_win.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_clamav_recursion_dos_vuln_win.nasl?root=openvas&view=markup
ClamAV Recursion Level Handling Denial of Service Vulnerability
(Windows)

== Nessus plugins (8) ==

56927 redhat-RHSA-2011-1465.nasl
http://nessus.org/plugins/index.php?view=single&id=56927
RHSA-2011-1465: kernel

56926 fedora_2011-15846.nasl
http://nessus.org/plugins/index.php?view=single&id=56926
Fedora 15 2011-15846

56925 fedora_2011-15841.nasl
http://nessus.org/plugins/index.php?view=single&id=56925
Fedora 16 2011-15841

56924 fedora_2011-15831.nasl
http://nessus.org/plugins/index.php?view=single&id=56924
Fedora 14 2011-15831

56923 debian_DSA-2352.nasl
http://nessus.org/plugins/index.php?view=single&id=56923
[DSA2352] DSA-2352-1 puppet

56922 asterisk_ast_2011_012.nasl
http://nessus.org/plugins/index.php?view=single&id=56922
Asterisk SIP Channel Driver Uninitialized Variable Request Parsing DoS
(AST-2011-012)

56921 asterisk_ast_2011_011.nasl
http://nessus.org/plugins/index.php?view=single&id=56921
Asterisk Invalid INVITE / REGISTER SIP Request Username Enumeration
(AST-2011-011)

56920 google_chrome_15_0_874_121.nasl
http://nessus.org/plugins/index.php?view=single&id=56920
Google Chrome < 15.0.874.121 V8 Out-of-bounds Write Unspecified Remote
Memory Corruption
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: