Nmap Development mailing list archives

New VA Modules: OpenVAS: 10, Nessus: 17


From: New VA Module Alert Service <postmaster () insecure org>
Date: Fri, 29 Mar 2013 10:00:57 -0700 (PDT)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== OpenVAS plugins (10) ==

r15890 803185 2013/gb_firebird_cnct_num_bof_vuln_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_firebird_cnct_num_bof_vuln_win.nasl?root=openvas&view=markup
Firebird Relational Database CNCT Group Number Buffer Overflow
Vulnerability (Win)

r15890 803448 2013/gb_wordpress_mailup_mult_vuln.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_wordpress_mailup_mult_vuln.nasl?root=openvas&view=markup
Wordpress MailUp Plugin Multiple Vulnerabilities

r15890 803450 2013/gb_wordpress_wp_banners_lite_xss_vuln.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_wordpress_wp_banners_lite_xss_vuln.nasl?root=openvas&view=markup
Wordpress WP Banners Lite Plugin Cross Site Scripting Vulnerability

r15890 803321 2013/gb_mcafee_vse_security_bypass_vuln_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_mcafee_vse_security_bypass_vuln_win.nasl?root=openvas&view=markup
McAfee VirusScan Enterprise Security Bypass Vulnerability (Windows)

r15890 803320 2013/gb_mcafee_vse_priv_esc_vuln_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_mcafee_vse_priv_esc_vuln_win.nasl?root=openvas&view=markup
McAfee VirusScan Enterprise Privilege Escalation Vulnerability (Windows)

r15890 803187 2013/gb_ibm_lotus_domino_http_server_mult_vuln.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_ibm_lotus_domino_http_server_mult_vuln.nasl?root=openvas&view=markup
IBM Lotus Domino HTTP Server Multiple Vulnerabilities

r15890 803322 2013/gb_mcafee_vse_untrusted_searchpath_vuln_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_mcafee_vse_untrusted_searchpath_vuln_win.nasl?root=openvas&view=markup
McAfee VirusScan Enterprise Untrusted Search Path Vulnerability
(Windows)

r15890 gb_mcafee_virusscan_enterprise_detect_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_mcafee_virusscan_enterprise_detect_win.nasl?root=openvas&view=markup
McAfee VirusScan Enterprise Version Detection (Windows)

r15890 803186 2013/gb_knet_web_server_bof_vuln.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_knet_web_server_bof_vuln.nasl?root=openvas&view=markup
KNet Web Server Long Request Buffer Overflow Vulnerability

r15890 803449 2013/gb_wordpress_level_four_storefront_sql_inj_vuln.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_wordpress_level_four_storefront_sql_inj_vuln.nasl?root=openvas&view=markup
Wordpress Level Four Storefront Plugin SQL Injection Vulnerability

== Nessus plugins (17) ==

65735 vmware_VMSA-2013-0004.nasl
http://nessus.org/plugins/index.php?view=single&id=65735
VMSA-2013-0004 : VMware ESXi security update for third party library

65734 mysql_5_5_30.nasl
http://nessus.org/plugins/index.php?view=single&id=65734
MySQL 5.5 < 5.5.30 yaSSL Buffer Overflow

65733 mysql_5_1_68.nasl
http://nessus.org/plugins/index.php?view=single&id=65733
MySQL 5.1 < 5.1.68 Multiple Vulnerabilities

65732 mariadb_5_5_30.nasl
http://nessus.org/plugins/index.php?view=single&id=65732
MariaDB 5.5 < 5.5.30 Multiple Vulnerabilities

65731 mariadb_5_5_28.nasl
http://nessus.org/plugins/index.php?view=single&id=65731
MariaDB 5.5 < 5.5.28 Multiple Vulnerabilities

65730 ubuntu_USN-1782-1.nasl
http://nessus.org/plugins/index.php?view=single&id=65730
Ubuntu 8.04 LTS / 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : libxml2
vulnerability (USN-1782-1)

65729 redhat-RHSA-2013-0690.nasl
http://nessus.org/plugins/index.php?view=single&id=65729
RHEL 5 : bind97 (RHSA-2013-0690)

65728 redhat-RHSA-2013-0689.nasl
http://nessus.org/plugins/index.php?view=single&id=65728
RHEL 6 : bind (RHSA-2013-0689)

65727 debian_DSA-2655.nasl
http://nessus.org/plugins/index.php?view=single&id=65727
Debian DSA-2655-1 : rails - several vulnerabilities

65726 centos_RHSA-2013-0690.nasl
http://nessus.org/plugins/index.php?view=single&id=65726
CentOS : RHSA-2013-0690

65725 centos_RHSA-2013-0687.nasl
http://nessus.org/plugins/index.php?view=single&id=65725
CentOS : RHSA-2013-0687

65724 Slackware_SSA_2013-087-01.nasl
http://nessus.org/plugins/index.php?view=single&id=65724
SSA-2013-087-01 : libssh

65723 google_chrome_frame_26_0_1410_28.nasl
http://nessus.org/plugins/index.php?view=single&id=65723
Google Chrome Frame < 26.0.1410.28 Denial of Service

65722 novell_zcc_rce.nasl
http://nessus.org/plugins/index.php?view=single&id=65722
Novell ZENworks Control Center File Upload Remote Code Execution

65721 nconf_delete_attr_id_sql_injection.nasl
http://nessus.org/plugins/index.php?view=single&id=65721
NConf delete_attr.php id Parameter SQL Injection

65720 ckeditor_sample_posteddata_xss.nasl
http://nessus.org/plugins/index.php?view=single&id=65720
CKEditor sample_posteddata.php XSS

math64.inc
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: