Nmap Development mailing list archives

New VA Modules: NSE: 3, MSF: 2, OpenVAS: 8


From: New VA Module Alert Service <postmaster () insecure org>
Date: Mon, 5 May 2014 10:00:44 +0000 (UTC)

This report describes any new scripts/modules/exploits added to Nmap,
Metasploit, Nessus, and OpenVAS since yesterday.

== Nmap Scripting Engine scripts (3) ==

r32856 http-vuln-cve2006-3392 http://nmap.org/nsedoc/scripts/http-vuln-cve2006-3392.html
https://svn.nmap.org/nmap/scripts/http-vuln-cve2006-3392.nse
Author: Paul AMAR <aos.paul () gmail com>
Exploits a file disclosure vulnerability in Webmin (CVE-2010-0738)

r32857 http-vuln-cve2013-7091 http://nmap.org/nsedoc/scripts/http-vuln-cve2013-7091.html
https://svn.nmap.org/nmap/scripts/http-vuln-cve2013-7091.nse
Author: Paul AMAR <aos.paul () gmail com>, Ron Bowes
An 0 day was released on the 6th December 2013 by rubina119, and was
patched in Zimbra 7.2.6.

r32860 http-vuln-wnr1000-creds http://nmap.org/nsedoc/scripts/http-vuln-wnr1000-creds.html
https://svn.nmap.org/nmap/scripts/http-vuln-wnr1000-creds.nse
Author: Paul AMAR <aos.paul () gmail com>, Rob Nicholls
A vulnerability has been discovered in WNR 1000 series that allows an
attacker to retrieve administrator credentials with the router
interface. Tested On Firmware Version(s): V1.0.2.60_60.0.86 (Latest) and
V1.0.2.54_60.0.82NA

== Metasploit modules (2) ==

2a1e9616 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/local/ms13_058_schlamperei.rb
ms13_053_schlamperei

41720428 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/local/ms13_053_schlamperei.rb
Windows NTUserMessageCall Win32k Kernel Pool Overflow (Schlamperei)

== OpenVAS plugins (8) ==

r413 702913 2014/deb_2913.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2913.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2913-1 (drupal7 - security update

r413 702914 2014/deb_2914.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2914.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2914-1 (drupal6 - security update

r413 702915 2014/deb_2915.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2915.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2915-1 (dpkg - security update

r413 702916 2014/deb_2916.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2916.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2916-1 (libmms - security update

r413 702917 2014/deb_2917.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2917.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2917-1 (super - security update

r413 702918 2014/deb_2918.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2918.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2918-1 (iceweasel - security update

r413 702919 2014/deb_2919.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2919.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2919-1 (mysql-5.5 - security update

r413 702920 2014/deb_2920.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2920.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2920-1 (chromium-browser - security update
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: