Nmap Development mailing list archives

New VA Modules: OpenVAS: 1, MSF: 5, Nessus: 13


From: New VA Module Alert Service <postmaster () insecure org>
Date: Wed, 18 Jul 2012 10:00:40 -0700 (PDT)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== OpenVAS plugins (1) ==

r13746 gb_vivotek_network_cameras_54476.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_vivotek_network_cameras_54476.nasl?root=openvas&view=markup
Vivotek Network Cameras Information Disclosure Vulnerability

== Metasploit modules (5) ==

r15647 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/novell/zenworks_preboot_op21_bof.rb
Novell ZENworks Configuration Management Preboot Service 0x21 Buffer
Overflow

r15648 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/novell/zenworks_preboot_op6_bof.rb
Novell ZENworks Configuration Management Preboot Service 0x06 Buffer
Overflow

r15649 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/local/ms10_092_schelevator.rb
Windows Escalate Task Scheduler XML Privilege Escalation

r15649 http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/linux/local/sock_sendpage.rb
Linux Kernel Sendpage Local Privilege Escalation

r15649 http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/unix/local/setuid_nmap.rb
setuid nmap "exploit"

== Nessus plugins (13) ==

59997 juniper_psn-2012-07-653.nasl
http://nessus.org/plugins/index.php?view=single&id=59997
Juniper Junos host-inbound-traffic Implicit Allow (PSN-2012-07-653)

59996 juniper_psn-2012-07-652.nasl
http://nessus.org/plugins/index.php?view=single&id=59996
Juniper Junos UDP/IP DoS (PSN-2012-07-652)

59995 juniper_psn-2012-07-651.nasl
http://nessus.org/plugins/index.php?view=single&id=59995
Juniper Junos lo0 Firewall Bypass (PSN-2012-07-651)

59994 juniper_psn-2012-07-650.nasl
http://nessus.org/plugins/index.php?view=single&id=59994
Juniper Junos J-Web Hash Collision DoS (PSN-2012-07-650)

59993 juniper_psn-2012-07-649.nasl
http://nessus.org/plugins/index.php?view=single&id=59993
Juniper Junos J-Web XSS (PSN-2012-07-649)

59992 juniper_psn-2012-07-648.nasl
http://nessus.org/plugins/index.php?view=single&id=59992
Juniper Junos PIM DoS (PSN-2012-07-648)

59991 juniper_psn-2012-07-647.nasl
http://nessus.org/plugins/index.php?view=single&id=59991
Juniper Junos IS-IS hello DoS (PSN-2012-07-647)

59990 juniper_psn-2012-07-646.nasl
http://nessus.org/plugins/index.php?view=single&id=59990
Juniper Junos load factory-default Privilege Escalation
(PSN-2012-07-646)

59989 juniper_psn-2012-07-645.nasl
http://nessus.org/plugins/index.php?view=single&id=59989
Juniper Junos OpenSSL ASN.1 Memory Corruption (PSN-2012-07-645)

59988 juniper_psn-2012-07-644.nasl
http://nessus.org/plugins/index.php?view=single&id=59988
Juniper Junos ICMPv6 DoS (PSN-2012-07-644)

59987 juniper_psn-2012-07-643.nasl
http://nessus.org/plugins/index.php?view=single&id=59987
Juniper Junos SYN Cookie Protection DoS (PSN-2012-07-643)

58232 tenable_appliance_web_bypass.nasl
http://nessus.org/plugins/index.php?view=single&id=58232
Tenable Appliance Web Authentication Bypass

58231 tenable_appliance_web_detect.nasl
http://nessus.org/plugins/index.php?view=single&id=58231
Tenable Appliance Web Detection
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: