Nmap Development mailing list archives

New VA Modules: OpenVAS: 3, Nessus: 24


From: New VA Module Alert Service <postmaster () insecure org>
Date: Fri, 12 Nov 2010 10:00:35 -0800 (PST)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== OpenVAS plugins (3) ==

r9398 801629 gb_adobe_flash_player_mult_vuln_nov10_win.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_adobe_flash_player_mult_vuln_nov10_win.nasl?root=openvas&view=markup
Adobe Flash Player Multiple Vulnerabilities (Windows)

r9398 801630 gb_adobe_flash_player_mult_vuln_nov10_lin.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_adobe_flash_player_mult_vuln_nov10_lin.nasl?root=openvas&view=markup
Adobe Flash Player Multiple Vulnerabilities (Linux)

r9398 801631 gb_adobe_shockwave_player_use_after_free_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_adobe_shockwave_player_use_after_free_vuln.nasl?root=openvas&view=markup
Adobe Shockwave Player Use-After-Free Vulnerability

== Nessus plugins (24) ==

50573 ubuntu_USN-1017-1.nasl
http://nessus.org/plugins/index.php?view=single&id=50573
USN1017-1 : mysql-5.1, mysql-dfsg-5.0, mysql-dfsg-5.1 vulnerabilities

50572 solaris10_144488.nasl
http://nessus.org/plugins/index.php?view=single&id=50572
Solaris 10 (sparc) : 144488-03

50571 mandriva_MDVSA-2010-227.nasl
http://nessus.org/plugins/index.php?view=single&id=50571
MDVSA-2010:227: proftpd

50570 mandriva_MDVA-2010-222.nasl
http://nessus.org/plugins/index.php?view=single&id=50570
MDVA-2010:222: tomboy

50569 mandriva_MDVA-2010-221.nasl
http://nessus.org/plugins/index.php?view=single&id=50569
MDVA-2010:221: postgresql

50568 fedora_2010-17220.nasl
http://nessus.org/plugins/index.php?view=single&id=50568
Fedora 12 2010-17220

50567 fedora_2010-17202.nasl
http://nessus.org/plugins/index.php?view=single&id=50567
Fedora 13 2010-17202

50566 fedora_2010-17021.nasl
http://nessus.org/plugins/index.php?view=single&id=50566
Fedora 14 2010-17021

50565 fedora_2010-16916.nasl
http://nessus.org/plugins/index.php?view=single&id=50565
Fedora 13 2010-16916

50564 fedora_2010-16907.nasl
http://nessus.org/plugins/index.php?view=single&id=50564
Fedora 12 2010-16907

50563 hp_sim_plugins_authentication_bypass.nasl
http://nessus.org/plugins/index.php?view=single&id=50563
HP Systems Insight Manager Multiple Products Authentication Bypass

50562 adobe_fms_4_0_1.nasl
http://nessus.org/plugins/index.php?view=single&id=50562
Adobe Flash Media Server < 3.0.7 / 3.5.5 / 4.0.1 Multiple
Vulnerabilities (APSB10-27)

50561 websphere_7_0_0_13.nasl
http://nessus.org/plugins/index.php?view=single&id=50561
IBM WebSphere Application Server 7.0 < Fix Pack 13 Multiple
Vulnerabilities

50560 ubuntu_USN-1016-1.nasl
http://nessus.org/plugins/index.php?view=single&id=50560
USN1016-1 : libxml2 vulnerability

50559 ubuntu_USN-1015-1.nasl
http://nessus.org/plugins/index.php?view=single&id=50559
USN1015-1 : libvpx vulnerability

50558 mandriva_MDVSA-2010-226.nasl
http://nessus.org/plugins/index.php?view=single&id=50558
MDVSA-2010:226: dhcp

50557 fedora_2010-17145.nasl
http://nessus.org/plugins/index.php?view=single&id=50557
Fedora 12 2010-17145

50556 fedora_2010-17130.nasl
http://nessus.org/plugins/index.php?view=single&id=50556
Fedora 12 2010-17130

50555 fedora_2010-17126.nasl
http://nessus.org/plugins/index.php?view=single&id=50555
Fedora 12 2010-17126

50554 fedora_2010-17104.nasl
http://nessus.org/plugins/index.php?view=single&id=50554
Fedora 14 2010-17104

50553 fedora_2010-17098.nasl
http://nessus.org/plugins/index.php?view=single&id=50553
Fedora 13 2010-17098

50552 fedora_2010-17096.nasl
http://nessus.org/plugins/index.php?view=single&id=50552
Fedora 13 2010-17096

50551 fedora_2010-17091.nasl
http://nessus.org/plugins/index.php?view=single&id=50551
Fedora 14 2010-17091

50550 fedora_2010-17084.nasl
http://nessus.org/plugins/index.php?view=single&id=50550
Fedora 13 2010-17084
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: