Nmap Development mailing list archives

New VA Modules: OpenVAS: 5, Nessus: 32


From: New VA Module Alert Service <postmaster () insecure org>
Date: Thu, 7 Mar 2013 10:00:42 -0800 (PST)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== OpenVAS plugins (5) ==

r15632 803177 2013/gb_mozilla_thunderbird_mult_vuln05_jan13_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_mozilla_thunderbird_mult_vuln05_jan13_win.nasl?root=openvas&view=markup
Mozilla Thunderbird Multiple Vulnerabilities-05 January13 (Windows)

r15632 803178 2013/gb_mozilla_seamonkey_mult_vuln05_jan13_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_mozilla_seamonkey_mult_vuln05_jan13_win.nasl?root=openvas&view=markup
Mozilla SeaMonkey Multiple Vulnerabilities-05 January13 (Windows)

r15632 803175 2013/gb_mozilla_thunderbird_vuln05_jan13_macosx.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_mozilla_thunderbird_vuln05_jan13_macosx.nasl?root=openvas&view=markup
Mozilla Thunderbird Multiple Vulnerabilities-05 January13 (Mac OS X)

r15632 803176 2013/gb_mozilla_seamonkey_vuln05_jan13_macosx.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_mozilla_seamonkey_vuln05_jan13_macosx.nasl?root=openvas&view=markup
Mozilla SeaMonkey Multiple Vulnerabilities-05 January13 (Mac OS X)

r15639 2013/gb_os_eol.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_os_eol.nasl?root=openvas&view=markup
OS End Of Life Detection

== Nessus plugins (32) ==

65077 ubuntu_USN-1756-1.nasl
http://nessus.org/plugins/index.php?view=single&id=65077
USN-1756-1 : linux vulnerabilities

65076 sl_20130305_kernel_on_SL5_x.nasl
http://nessus.org/plugins/index.php?view=single&id=65076
Scientific Linux Security Update : kernel on SL5.x i386/x86_64

65075 redhat-RHSA-2013-0605.nasl
http://nessus.org/plugins/index.php?view=single&id=65075
RHEL 6 : java-1.6.0-openjdk (RHSA-2013-0605)

65074 redhat-RHSA-2013-0604.nasl
http://nessus.org/plugins/index.php?view=single&id=65074
RHEL 5 : java-1.6.0-openjdk (RHSA-2013-0604)

65073 redhat-RHSA-2013-0603.nasl
http://nessus.org/plugins/index.php?view=single&id=65073
RHEL 5 : java-1.7.0-openjdk (RHSA-2013-0603)

65072 redhat-RHSA-2013-0602.nasl
http://nessus.org/plugins/index.php?view=single&id=65072
RHEL 6 : java-1.7.0-openjdk (RHSA-2013-0602)

65071 redhat-RHSA-2013-0601.nasl
http://nessus.org/plugins/index.php?view=single&id=65071
RHEL 5 / 6 : java-1.6.0-sun (RHSA-2013-0601)

65070 redhat-RHSA-2013-0600.nasl
http://nessus.org/plugins/index.php?view=single&id=65070
RHEL 5 / 6 : java-1.7.0-oracle (RHSA-2013-0600)

65069 redhat-RHSA-2013-0599.nasl
http://nessus.org/plugins/index.php?view=single&id=65069
RHEL 5 : xen (RHSA-2013-0599)

65068 freebsd_pkg_b9a347ac867111e2b73c0019d18c446a.nasl
http://nessus.org/plugins/index.php?view=single&id=65068
FreeBSD : typo3 -- Multiple vulnerabilities in TYPO3 Core
(b9a347ac-8671-11e2-b73c-0019d18c446a)

65067 freebsd_pkg_40d5ab3785f211e2b52800262d5ed8ee.nasl
http://nessus.org/plugins/index.php?view=single&id=65067
FreeBSD : chromium -- multiple vulnerabilities
(40d5ab37-85f2-11e2-b528-00262d5ed8ee)

65066 fedora_2013-3467.nasl
http://nessus.org/plugins/index.php?view=single&id=65066
Fedora 17 : java-1.7.0-openjdk-1.7.0.9-2.3.8.0.fc17 (2013-3467)

65065 fedora_2013-3032.nasl
http://nessus.org/plugins/index.php?view=single&id=65065
Fedora 18 : gksu-polkit-0.0.3-6.fc18 (2013-3032)

65064 centos_RHSA-2013-0604.nasl
http://nessus.org/plugins/index.php?view=single&id=65064
CentOS : RHSA-2013-0604

65063 centos_RHSA-2013-0599.nasl
http://nessus.org/plugins/index.php?view=single&id=65063
CentOS : RHSA-2013-0599

65062 centos_RHSA-2013-0594.nasl
http://nessus.org/plugins/index.php?view=single&id=65062
CentOS : RHSA-2013-0594

65061 centos_RHSA-2013-0587.nasl
http://nessus.org/plugins/index.php?view=single&id=65061
CentOS : RHSA-2013-0587

65060 Slackware_SSA_2013-065-01.nasl
http://nessus.org/plugins/index.php?view=single&id=65060
SSA-2013-065-01 : sudo

65059 foswiki_1_1_8.nasl
http://nessus.org/plugins/index.php?view=single&id=65059
Foswiki < 1.1.8 MAKETEXT Macro Arbitrary Code Injection

65058 foswiki_detect.nasl
http://nessus.org/plugins/index.php?view=single&id=65058
Foswiki Detection

65057 smb_insecure_service_permissions.nasl
http://nessus.org/plugins/index.php?view=single&id=65057
Insecure Windows Service Permissions

65056 jenkins_1_502.nasl
http://nessus.org/plugins/index.php?view=single&id=65056
Jenkins < 1.502 / 1.480.3 Multiple Vulnerabilities

65055 jenkins_1_498.nasl
http://nessus.org/plugins/index.php?view=single&id=65055
Jenkins < 1.498 / 1.480.2 Unspecified Master Cryptographic Key
Information Disclosure

65054 jenkins_detect.nasl
http://nessus.org/plugins/index.php?view=single&id=65054
Jenkins Detection

65053 oracle_java7_update17_unix.nasl
http://nessus.org/plugins/index.php?view=single&id=65053
Oracle Java JDK / JRE 7 < Update 17 Remote Code Execution

65052 oracle_java7_update17.nasl
http://nessus.org/plugins/index.php?view=single&id=65052
Oracle Java JDK / JRE 7 < Update 17 Remote Code Execution

65051 oracle_java6_update43_unix.nasl
http://nessus.org/plugins/index.php?view=single&id=65051
Oracle Java JDK / JRE 6 < Update 43 Remote Code Execution

65050 oracle_java6_update43.nasl
http://nessus.org/plugins/index.php?view=single&id=65050
Oracle Java JDK / JRE 6 < Update 43 Remote Code Execution

65049 oracle_java5_update41_unix.nasl
http://nessus.org/plugins/index.php?view=single&id=65049
Oracle Java JDK / JRE 5 < Update 41 Remote Code Execution

65048 oracle_java5_update41.nasl
http://nessus.org/plugins/index.php?view=single&id=65048
Oracle Java JDK / JRE 5 < Update 41 Remote Code Execution

65047 ksplice.nasl
http://nessus.org/plugins/index.php?view=single&id=65047
KSplice : Installed Patches

65046 scrutinizer_10_1_2.nasl
http://nessus.org/plugins/index.php?view=single&id=65046
Scrutinizer < 10.1.2 Multiple Vulnerabilities
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: