Nmap Development mailing list archives

New VA Modules: NSE: 1, OpenVAS: 5, MSF: 1, Nessus: 8


From: New VA Module Alert Service <postmaster () insecure org>
Date: Thu, 5 Jul 2012 10:00:43 -0700 (PDT)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== Nmap Scripting Engine scripts (1) ==

r29132 http-tplink-dir-traversal http://nmap.org/nsedoc/scripts/http-tplink-dir-traversal.html
https://svn.nmap.org/nmap/scripts/http-tplink-dir-traversal.nse
Exploits a directory traversal vulnerability existing in several TP-Link
wireless routers. Attackers may exploit this vulnerability to read any
of the configuration and password files remotely and without
authentication.

== OpenVAS plugins (5) ==

r13685 gb_ms00-30_remote.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_ms00-30_remote.nasl?root=openvas&view=markup
Microsoft IIS Malformed File Extension Denial of Service Vulnerability

r13685 802876 gb_trendmicro_control_manager_cmdprocessor_bof_vuln.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_trendmicro_control_manager_cmdprocessor_bof_vuln.nasl?root=openvas&view=markup
Trend Micro Control Manager 'CmdProcessor.exe' Buffer Overflow
Vulnerability

r13685 gb_ms99-33_remote.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_ms99-33_remote.nasl?root=openvas&view=markup
Microsoft IIS FTP Server 'Malformed FTP List Request' DOS Vulnerability

r13685 802905 gb_powernet_twin_client_rfsync_dos_vuln.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_powernet_twin_client_rfsync_dos_vuln.nasl?root=openvas&view=markup
PowerNet Twin Client 'RFSynC' Denial of Service Vulnerability

r13685 gb_ms02-018_remote.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_ms02-018_remote.nasl?root=openvas&view=markup
Microsoft IIS FTP Connection Status Request Denial of Service
Vulnerability

== Metasploit modules (1) ==

r15572 http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/misc/poisonivy_bof.rb
Poison Ivy 2.3.2 C&C Server Buffer Overflow

== Nessus plugins (8) ==

59845 ubuntu_USN-1497-1.nasl
http://nessus.org/plugins/index.php?view=single&id=59845
USN-1497-1 : nova vulnerabilities

59844 redhat-RHSA-2012-1054.nasl
http://nessus.org/plugins/index.php?view=single&id=59844
RHSA-2012-1054: libtiff

59843 mandriva_MDVSA-2012-101.nasl
http://nessus.org/plugins/index.php?view=single&id=59843
MDVSA-2012:101 : libtiff

59842 fedora_2012-9575.nasl
http://nessus.org/plugins/index.php?view=single&id=59842
Fedora 17 2012-9575

59841 fedora_2012-9546.nasl
http://nessus.org/plugins/index.php?view=single&id=59841
Fedora 16 2012-9546

59840 fedora_2012-9029.nasl
http://nessus.org/plugins/index.php?view=single&id=59840
Fedora 16 2012-9029

59839 debian_DSA-2507.nasl
http://nessus.org/plugins/index.php?view=single&id=59839
Debian DSA-2507-1 : openjdk-6 - several vulnerabilities

59838 centos_RHSA-2012-1054.nasl
http://nessus.org/plugins/index.php?view=single&id=59838
CentOS : RHSA-2012-1054
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: