Nmap Development mailing list archives

New VA Modules: OpenVAS: 28, MSF: 1, Nessus: 1


From: New VA Module Alert Service <postmaster () insecure org>
Date: Fri, 25 May 2012 10:01:50 -0700 (PDT)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== OpenVAS plugins (28) ==

r13497 841014 gb_ubuntu_USN_1449_1.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_ubuntu_USN_1449_1.nasl?root=openvas&view=markup
Ubuntu Update for feedparser USN-1449-1

r13497 secpod_google_sketchup_detect_macosx.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/secpod_google_sketchup_detect_macosx.nasl?root=openvas&view=markup
Google SketchUp Version Detection (Mac OS X)

r13497 802785 gb_adobe_flash_professional_jpg_obj_bof_vuln_macosx.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_adobe_flash_professional_jpg_obj_bof_vuln_macosx.nasl?root=openvas&view=markup
Adobe Flash Professional JPG Object Processing BOF Vulnerability (Mac OS
X)

r13497 802788 gb_adobe_illustrator_mult_unspecified_vuln_macosx.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_adobe_illustrator_mult_unspecified_vuln_macosx.nasl?root=openvas&view=markup
Adobe Illustrator Multiple Unspecified Vulnerabilities (Mac OS X)

r13497 gb_adobe_flash_professional_detect_macosx.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_adobe_flash_professional_detect_macosx.nasl?root=openvas&view=markup
Adobe Flash Professional Version Detection (Mac OS X)

r13497 gb_adobe_photoshop_detect_macosx.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_adobe_photoshop_detect_macosx.nasl?root=openvas&view=markup
Adobe Photoshop Version Detection (Mac OS X)

r13497 902835 secpod_tftpd32_req_format_string_vuln.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/secpod_tftpd32_req_format_string_vuln.nasl?root=openvas&view=markup
TFTPD32 Request Error Message Format String Vulnerability

r13497 903028 secpod_zebedee_redirection_port_dos_vuln.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/secpod_zebedee_redirection_port_dos_vuln.nasl?root=openvas&view=markup
Zebedee Allowed Redirection Port Denial of Service Vulnerability

r13497 902838 secpod_php_address_book_mult_xss_vuln.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/secpod_php_address_book_mult_xss_vuln.nasl?root=openvas&view=markup
PHP Address Book Multiple Cross Site Scripting Vulnerabilities

r13497 841015 gb_ubuntu_USN_1450_1.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_ubuntu_USN_1450_1.nasl?root=openvas&view=markup
Ubuntu Update for net-snmp USN-1450-1

r13497 802779 gb_adobe_shockwave_player_mult_code_exec_n_dos_vuln_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_adobe_shockwave_player_mult_code_exec_n_dos_vuln_win.nasl?root=openvas&view=markup
Adobe Shockwave Player Multiple Code Execution and DoS Vulnerabilities
(Windows)

r13497 902679 secpod_google_sketchup_skp_file_code_exec_vuln_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/secpod_google_sketchup_skp_file_code_exec_vuln_win.nasl?root=openvas&view=markup
Google SketchUp '.SKP' File Remote Code Execution Vulnerability
(Windows)

r13497 903029 secpod_apple_safari_mult_vuln_win_oct11.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/secpod_apple_safari_mult_vuln_win_oct11.nasl?root=openvas&view=markup
Apple Safari Multiple Vulnerabilities - Oct 2011 (Windows)

r13497 902837 secpod_php_apache_req_headers_bof_vuln.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/secpod_php_apache_req_headers_bof_vuln.nasl?root=openvas&view=markup
PHP 'apache_request_headers()' Function Buffer Overflow Vulnerability
(Windows)

r13497 802781 gb_adobe_flash_professional_jpg_obj_bof_vuln_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_adobe_flash_professional_jpg_obj_bof_vuln_win.nasl?root=openvas&view=markup
Adobe Flash Professional JPG Object Processing BOF Vulnerability
(Windows)

r13497 802790 gb_adobe_illustrator_mult_unspecified_vuln_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_adobe_illustrator_mult_unspecified_vuln_win.nasl?root=openvas&view=markup
Adobe Illustrator Multiple Unspecified Vulnerabilities (Windows)

r13497 gb_adobe_illustrator_detect_macosx.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_adobe_illustrator_detect_macosx.nasl?root=openvas&view=markup
Adobe Illustrator Version Detection (Mac OS X)

r13497 gb_adobe_flash_professional_detect_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_adobe_flash_professional_detect_win.nasl?root=openvas&view=markup
Adobe Flash Professional Detection (Windows)

r13497 902839 secpod_ms_frontpage_ext_device_name_dos_vuln.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/secpod_ms_frontpage_ext_device_name_dos_vuln.nasl?root=openvas&view=markup
Microsoft FrontPage Server Extensions MS-DOS Device Name DoS
Vulnerability

r13497 gb_adobe_illustrator_detect_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_adobe_illustrator_detect_win.nasl?root=openvas&view=markup
Adobe Illustrator Detection (Windows)

r13497 902914 secpod_ms_iis_get_request_dos_vuln.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/secpod_ms_iis_get_request_dos_vuln.nasl?root=openvas&view=markup
Microsoft IIS GET Request Denial of Service Vulnerability

r13497 903027 secpod_macosx_su12-003.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/secpod_macosx_su12-003.nasl?root=openvas&view=markup
Mac OS X 'Internet plug-ins' Unspecified Vulnerability (2012-003)

r13497 902836 secpod_php_typeinfo_code_exec_vuln.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/secpod_php_typeinfo_code_exec_vuln.nasl?root=openvas&view=markup
PHP 'com_print_typeinfo()' Remote Code Execution Vulnerability (Windows)

r13497 802786 gb_adobe_photoshop_bof_n_use_after_free_vuln_macosx.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_adobe_photoshop_bof_n_use_after_free_vuln_macosx.nasl?root=openvas&view=markup
Adobe Photoshop BOF and Use After Free Vulnerabilities (Mac OS X)

r13497 902681 secpod_google_sketchup_skp_file_code_exec_vuln_macosx.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/secpod_google_sketchup_skp_file_code_exec_vuln_macosx.nasl?root=openvas&view=markup
Google SketchUp '.SKP' File Remote Code Execution Vulnerability (Mac OS
X)

r13497 802782 gb_adobe_photoshop_bof_n_use_after_free_vuln_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_adobe_photoshop_bof_n_use_after_free_vuln_win.nasl?root=openvas&view=markup
Adobe Photoshop BOF and Use After Free Vulnerabilities (Windows)

r13497 802780 gb_adobe_shockwave_player_mult_code_exec_n_dos_vuln_macosx.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_adobe_shockwave_player_mult_code_exec_n_dos_vuln_macosx.nasl?root=openvas&view=markup
Adobe Shockwave Player Multiple Code Execution and DoS Vulnerabilities
(Mac OS X)

r13497 841013 gb_ubuntu_USN_1451_1.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_ubuntu_USN_1451_1.nasl?root=openvas&view=markup
Ubuntu Update for openssl USN-1451-1

== Metasploit modules (1) ==

r15335 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/http/rabidhamster_r4_log.rb
RabidHamster R4 Log Entry sprintf() Buffer Overflow

== Nessus plugins (1) ==

59255 google_chrome_19_0_1084_52.nasl
http://nessus.org/plugins/index.php?view=single&id=59255
Google Chrome < 19.0.1084.52 Multiple Vulnerabilities
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: