Nmap Development mailing list archives
New VA Modules: MSF: 1, Nessus: 16, OpenVAS: 30
From: New VA Module Alert Service <postmaster () insecure org>
Date: Fri, 25 Apr 2014 10:01:57 +0000 (UTC)
This report describes any new scripts/modules/exploits added to Nmap, Metasploit, Nessus, and OpenVAS since yesterday. == Metasploit modules (1) == bca0d603 https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/ssh/ssh_enumusers.rb SSH Username Enumeration == Nessus plugins (16) == 73690 symantec_messaging_gateway_sym14-006.nasl http://nessus.org/plugins/index.php?view=single&id=73690 Symantec Messaging Gateway 10.x < 10.5.2 Management Console XSS (SYM14-006) 73689 pgp_desktop_10_3_2_mp1.nasl http://nessus.org/plugins/index.php?view=single&id=73689 Symantec Encryption Desktop Multiple DoS Vulnerabilities 73688 junos_pulse_jsa10623.nasl http://nessus.org/plugins/index.php?view=single&id=73688 Junos Pulse Secure Access IVE / UAC OS OpenSSL Heartbeat Information Disclosure (JSA10623) (Heartbleed) 73687 juniper_jsa10623.nasl http://nessus.org/plugins/index.php?view=single&id=73687 Juniper Junos OpenSSL Heartbeat Information Disclosure (JSA10623) (Heartbleed) 73686 wordpress_jetpack_security_bypass.nasl http://nessus.org/plugins/index.php?view=single&id=73686 Jetpack Plugin for WordPress Security Bypass 73685 nas4free_default_creds.nasl http://nessus.org/plugins/index.php?view=single&id=73685 NAS4Free Web UI Default Credentials 73684 account_root_nas4free.nasl http://nessus.org/plugins/index.php?view=single&id=73684 Default Password (nas4free) for 'root' Account 73681 ubuntu_USN-2171-1.nasl http://nessus.org/plugins/index.php?view=single&id=73681 Ubuntu 14.04 : rsync vulnerability (USN-2171-1) 73680 ubuntu_USN-2170-1.nasl http://nessus.org/plugins/index.php?view=single&id=73680 Ubuntu 12.04 LTS / 12.10 / 13.10 / 14.04 : mysql-5.5 vulnerabilities (USN-2170-1) 73679 sl_20140423_tomcat6_on_SL6_x.nasl http://nessus.org/plugins/index.php?view=single&id=73679 Scientific Linux Security Update : tomcat6 on SL6.x (noarch) 73678 redhat-RHSA-2014-0429.nasl http://nessus.org/plugins/index.php?view=single&id=73678 RHEL 6 : tomcat6 (RHSA-2014:0429) 73677 oraclelinux_ELSA-2014-0429.nasl http://nessus.org/plugins/index.php?view=single&id=73677 Oracle Linux 6 : tomcat6 (ELSA-2014-0429) 73676 freebsd_pkg_59e72db2cae611e3842000e0814cab4e.nasl http://nessus.org/plugins/index.php?view=single&id=73676 FreeBSD : django -- multiple vulnerabilities (59e72db2-cae6-11e3-8420-00e0814cab4e) 73675 centos_RHSA-2014-0429.nasl http://nessus.org/plugins/index.php?view=single&id=73675 CentOS 6 : tomcat6 (CESA-2014:0429) nas4free_detect.nbin nas4free_version.nbin == OpenVAS plugins (30) == r388 702910 2014/deb_2910.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2910.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2910-1 (qemu-kvm - security update r388 702871 2014/deb_2871.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2871.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2871-1 (wireshark - several vulnerabilities r388 702908 2014/deb_2908.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2908.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2908-1 (openssl - security update r388 702881 2014/deb_2881.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2881.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2881-1 (iceweasel - security update r388 702873 2014/deb_2873.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2873.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2873-1 (file - several vulnerabilities r388 702891 2014/deb_2891.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2891.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2891-1 (mediawiki, mediawiki-extensions - security update r388 702883 2014/deb_2883.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2883.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2883-1 (chromium-browser - security update r388 702875 2014/deb_2875.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2875.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2875-1 (cups-filters - security update r388 702893 2014/deb_2893.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2893.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2893-1 (openswan - security update r388 702885 2014/deb_2885.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2885.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2885-1 (libyaml-libyaml-perl - security update r388 702877 2014/deb_2877.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2877.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2877-1 (lighttpd - security update r388 702869 2014/deb_2869.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2869.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2869-1 (gnutls26 - incorrect certificate verification r388 702879 2014/deb_2879.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2879.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2879-1 (libssh - security update r388 702889 2014/deb_2889.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2889.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2889-1 (postfixadmin - security update r388 702870 2014/deb_2870.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2870.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2870-1 (libyaml-libyaml-perl - heap-based buffer overflow r388 702880 2014/deb_2880.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2880.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2880-1 (python2.7 - security update r388 702872 2014/deb_2872.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2872.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2872-1 (udisks - several vulnerabilities r388 702890 2014/deb_2890.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2890.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2890-1 (libspring-java - security update r388 702882 2014/deb_2882.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2882.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2882-1 (extplorer - security update r388 702909 2014/deb_2909.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2909.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2909-1 (qemu - security update r388 702874 2014/deb_2874.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2874.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2874-1 (mutt - security update r388 702892 2014/deb_2892.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2892.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2892-1 (a2ps - security update r388 702884 2014/deb_2884.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2884.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2884-1 (libyaml - security update r388 702894 2014/deb_2894.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2894.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2894-1 (openssh - security update r388 702876 2014/deb_2876.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2876.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2876-1 (cups - security update r388 702886 2014/deb_2886.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2886.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2886-1 (libxalan2-java - security update r388 702868 2014/deb_2868.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2868.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2868-1 (php5 - denial of service r388 702878 2014/deb_2878.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2878.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2878-1 (virtualbox - security update r388 702888 2014/deb_2888.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2888.nasl?root=openvas-nvts&view=markup Debian Security Advisory DSA 2888-1 (ruby-actionpack-3.2 - security update r389 105012 2014/gb_VMSA-2014-0003.nasl https://wald.intevation.org/scm/viewvco.php/scripts/2014/gb_VMSA-2014-0003.nasl?root=openvas-nvts&view=markup VMSA-2014-0003 VMware vSphere Client updates address security vulnerabilities _______________________________________________ Sent through the dev mailing list http://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- New VA Modules: MSF: 1, Nessus: 16, OpenVAS: 30 New VA Module Alert Service (Apr 25)