Nmap Development mailing list archives

New VA Modules: NSE: 1, MSF: 4, Nessus: 14, OpenVAS: 3


From: New VA Module Alert Service <postmaster () insecure org>
Date: Wed, 20 Nov 2013 10:00:30 +0000 (UTC)

This report describes any new scripts/modules/exploits added to Nmap,
Metasploit, Nessus, and OpenVAS since yesterday.

== Nmap Scripting Engine scripts (1) ==

r32519 freelancer-info http://nmap.org/nsedoc/scripts/freelancer-info.html
https://svn.nmap.org/nmap/scripts/freelancer-info.nse
Author: Marin Maržić
Detects the Freelancer game server (FLServer.exe) service by sending a
status query UDP probe.

== Metasploit modules (4) ==

decf6ff6 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/linux/http/smt_ipmi_close_window_bof.rb
Supermicro Onboard IPMI close_window.cgi Buffer Overflow

9d616dbf 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/http/typo3_bruteforce.rb
Typo3 Login Bruteforcer

c5f21ef4 https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/post/osx/manage/vpn.rb
OSX

1e3860d6 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/dos/http/gzip_bomb_dos.rb
Gzip Memory Bomb DOS

== Nessus plugins (14) ==

70963 oracle_javaserver_faces_directory_traversal.nasl
http://nessus.org/plugins/index.php?view=single&id=70963
Oracle JavaServer Faces Multiple Partial Directory Traversals

70962 ubuntu_USN-2030-1.nasl
http://nessus.org/plugins/index.php?view=single&id=70962
Ubuntu 10.04 LTS / 12.04 LTS / 12.10 / 13.04 / 13.10 : nss
vulnerabilities (USN-2030-1)

70961 suse_11_xorg-x11-Xvnc-131022.nasl
http://nessus.org/plugins/index.php?view=single&id=70961
SuSE 11.2 / 11.3 Security Update : xorg-x11-server (SAT Patch Numbers
8463 / 8464)

70960 suse_11_java-1_6_0-ibm-131114.nasl
http://nessus.org/plugins/index.php?view=single&id=70960
SuSE 11.2 / 11.3 Security Update : IBM Java 6 (SAT Patch Numbers 8549 /
8550)

70959 gentoo_GLSA-201311-10.nasl
http://nessus.org/plugins/index.php?view=single&id=70959
GLSA-201311-10 : GraphicsMagick: Multiple vulnerabilities

70958 fedora_2013-21456.nasl
http://nessus.org/plugins/index.php?view=single&id=70958
Fedora 20 : krb5-1.11.3-32.fc20 (2013-21456)

70957 fedora_2013-20993.nasl
http://nessus.org/plugins/index.php?view=single&id=70957
Fedora 19 : ibus-pinyin-1.5.0-5.fc19 (2013-20993)

70956 fedora_2013-20988.nasl
http://nessus.org/plugins/index.php?view=single&id=70956
Fedora 19 : prboom-plus-2.5.1.3-3.fc19 (2013-20988)

70955 fedora_2013-20940.nasl
http://nessus.org/plugins/index.php?view=single&id=70955
Fedora 20 : prboom-plus-2.5.1.3-3.fc20 (2013-20940)

70954 Slackware_SSA_2013-322-04.nasl
http://nessus.org/plugins/index.php?view=single&id=70954
Slackware 14.0 / 14.1 / current : seamonkey (SSA:2013-322-04)

70953 Slackware_SSA_2013-322-03.nasl
http://nessus.org/plugins/index.php?view=single&id=70953
Slackware 14.0 / 14.1 / current : samba (SSA:2013-322-03)

70952 Slackware_SSA_2013-322-02.nasl
http://nessus.org/plugins/index.php?view=single&id=70952
Slackware 14.1 / current : openssh (SSA:2013-322-02)

70951 Slackware_SSA_2013-322-01.nasl
http://nessus.org/plugins/index.php?view=single&id=70951
Slackware 13.37 / 14.0 / 14.1 / current : mozilla-firefox
(SSA:2013-322-01)

never_seen_process_before.nbin

== OpenVAS plugins (3) ==

r68 2013/gb_openvas_administrator_auth_bypass_11_13.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2013/gb_openvas_administrator_auth_bypass_11_13.nasl?root=openvas-nvts&view=markup
OpenVAS Administrator Authentication Bypass

r68 2013/gb_gsm_manager_auth_bypass_11_13.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2013/gb_gsm_manager_auth_bypass_11_13.nasl?root=openvas-nvts&view=markup
GSM Manager Authentication Bypass

r68 2013/gb_openvas_manager_auth_bypass_11_13.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2013/gb_openvas_manager_auth_bypass_11_13.nasl?root=openvas-nvts&view=markup
OpenVAS Manager Authentication Bypass
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/

Current thread: