Nmap Development mailing list archives

New VA Modules: MSF: 1, Nessus: 16, OpenVAS: 30


From: New VA Module Alert Service <postmaster () insecure org>
Date: Fri, 25 Apr 2014 10:01:57 +0000 (UTC)

This report describes any new scripts/modules/exploits added to Nmap,
Metasploit, Nessus, and OpenVAS since yesterday.

== Metasploit modules (1) ==

bca0d603 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/ssh/ssh_enumusers.rb
SSH Username Enumeration

== Nessus plugins (16) ==

73690 symantec_messaging_gateway_sym14-006.nasl
http://nessus.org/plugins/index.php?view=single&id=73690
Symantec Messaging Gateway 10.x < 10.5.2 Management Console XSS
(SYM14-006)

73689 pgp_desktop_10_3_2_mp1.nasl
http://nessus.org/plugins/index.php?view=single&id=73689
Symantec Encryption Desktop Multiple DoS Vulnerabilities

73688 junos_pulse_jsa10623.nasl
http://nessus.org/plugins/index.php?view=single&id=73688
Junos Pulse Secure Access IVE / UAC OS OpenSSL Heartbeat Information
Disclosure (JSA10623) (Heartbleed)

73687 juniper_jsa10623.nasl
http://nessus.org/plugins/index.php?view=single&id=73687
Juniper Junos OpenSSL Heartbeat Information Disclosure (JSA10623)
(Heartbleed)

73686 wordpress_jetpack_security_bypass.nasl
http://nessus.org/plugins/index.php?view=single&id=73686
Jetpack Plugin for WordPress Security Bypass

73685 nas4free_default_creds.nasl
http://nessus.org/plugins/index.php?view=single&id=73685
NAS4Free Web UI Default Credentials

73684 account_root_nas4free.nasl
http://nessus.org/plugins/index.php?view=single&id=73684
Default Password (nas4free) for 'root' Account

73681 ubuntu_USN-2171-1.nasl
http://nessus.org/plugins/index.php?view=single&id=73681
Ubuntu 14.04 : rsync vulnerability (USN-2171-1)

73680 ubuntu_USN-2170-1.nasl
http://nessus.org/plugins/index.php?view=single&id=73680
Ubuntu 12.04 LTS / 12.10 / 13.10 / 14.04 : mysql-5.5 vulnerabilities
(USN-2170-1)

73679 sl_20140423_tomcat6_on_SL6_x.nasl
http://nessus.org/plugins/index.php?view=single&id=73679
Scientific Linux Security Update : tomcat6 on SL6.x (noarch)

73678 redhat-RHSA-2014-0429.nasl
http://nessus.org/plugins/index.php?view=single&id=73678
RHEL 6 : tomcat6 (RHSA-2014:0429)

73677 oraclelinux_ELSA-2014-0429.nasl
http://nessus.org/plugins/index.php?view=single&id=73677
Oracle Linux 6 : tomcat6 (ELSA-2014-0429)

73676 freebsd_pkg_59e72db2cae611e3842000e0814cab4e.nasl
http://nessus.org/plugins/index.php?view=single&id=73676
FreeBSD : django -- multiple vulnerabilities
(59e72db2-cae6-11e3-8420-00e0814cab4e)

73675 centos_RHSA-2014-0429.nasl
http://nessus.org/plugins/index.php?view=single&id=73675
CentOS 6 : tomcat6 (CESA-2014:0429)

nas4free_detect.nbin

nas4free_version.nbin

== OpenVAS plugins (30) ==

r388 702910 2014/deb_2910.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2910.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2910-1 (qemu-kvm - security update

r388 702871 2014/deb_2871.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2871.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2871-1 (wireshark - several vulnerabilities

r388 702908 2014/deb_2908.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2908.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2908-1 (openssl - security update

r388 702881 2014/deb_2881.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2881.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2881-1 (iceweasel - security update

r388 702873 2014/deb_2873.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2873.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2873-1 (file - several vulnerabilities

r388 702891 2014/deb_2891.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2891.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2891-1 (mediawiki, mediawiki-extensions -
security update

r388 702883 2014/deb_2883.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2883.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2883-1 (chromium-browser - security update

r388 702875 2014/deb_2875.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2875.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2875-1 (cups-filters - security update

r388 702893 2014/deb_2893.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2893.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2893-1 (openswan - security update

r388 702885 2014/deb_2885.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2885.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2885-1 (libyaml-libyaml-perl - security
update

r388 702877 2014/deb_2877.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2877.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2877-1 (lighttpd - security update

r388 702869 2014/deb_2869.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2869.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2869-1 (gnutls26 - incorrect certificate
verification

r388 702879 2014/deb_2879.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2879.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2879-1 (libssh - security update

r388 702889 2014/deb_2889.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2889.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2889-1 (postfixadmin - security update

r388 702870 2014/deb_2870.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2870.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2870-1 (libyaml-libyaml-perl - heap-based
buffer overflow

r388 702880 2014/deb_2880.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2880.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2880-1 (python2.7 - security update

r388 702872 2014/deb_2872.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2872.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2872-1 (udisks - several vulnerabilities

r388 702890 2014/deb_2890.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2890.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2890-1 (libspring-java - security update

r388 702882 2014/deb_2882.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2882.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2882-1 (extplorer - security update

r388 702909 2014/deb_2909.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2909.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2909-1 (qemu - security update

r388 702874 2014/deb_2874.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2874.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2874-1 (mutt - security update

r388 702892 2014/deb_2892.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2892.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2892-1 (a2ps - security update

r388 702884 2014/deb_2884.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2884.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2884-1 (libyaml - security update

r388 702894 2014/deb_2894.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2894.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2894-1 (openssh - security update

r388 702876 2014/deb_2876.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2876.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2876-1 (cups - security update

r388 702886 2014/deb_2886.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2886.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2886-1 (libxalan2-java - security update

r388 702868 2014/deb_2868.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2868.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2868-1 (php5 - denial of service

r388 702878 2014/deb_2878.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2878.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2878-1 (virtualbox - security update

r388 702888 2014/deb_2888.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2888.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2888-1 (ruby-actionpack-3.2 - security
update

r389 105012 2014/gb_VMSA-2014-0003.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/gb_VMSA-2014-0003.nasl?root=openvas-nvts&view=markup
VMSA-2014-0003 VMware vSphere Client updates address security
vulnerabilities
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: