Nmap Development mailing list archives

New VA Modules: OpenVAS: 14, MSF: 1, Nessus: 12


From: New VA Module Alert Service <postmaster () insecure org>
Date: Tue, 22 Mar 2011 10:08:57 -0700 (PDT)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== OpenVAS plugins (14) ==

r10611 801909 gb_kodak_insite_multiple_xss.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_kodak_insite_multiple_xss.nasl?root=openvas&view=markup
Kodak InSite Multiple Cross Site Scripting Vulnerabilities

r10611 902352 secpod_otrs_xss_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_otrs_xss_vuln.nasl?root=openvas&view=markup
Open Ticket Request System (OTRS) 'AgentTicketZoom' Cross-site scripting
Vulnerability

r10611 902356 secpod_php_use_after_free_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_php_use_after_free_vuln.nasl?root=openvas&view=markup
PHP 'substr_replace()' Use After Free Vulnerability

r10611 801765 gb_ruby_rails_logfile_inj_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_ruby_rails_logfile_inj_vuln.nasl?root=openvas&view=markup
Ruby on Rails Logfile Injection Vulnerability

r10611 802010 gb_nostromo_nhttpd_web_server_dir_trav_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_nostromo_nhttpd_web_server_dir_trav_vuln.nasl?root=openvas&view=markup
Nostromo nhttpd Webserver Directory Traversal Vulnerability

r10611 801766 gb_otrs_cmd_exec_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_otrs_cmd_exec_vuln.nasl?root=openvas&view=markup
Open Ticket Request System (OTRS) Command Execution Vulnerability

r10611 801861 gb_ibm_was_mult_vuln_mar11.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_ibm_was_mult_vuln_mar11.nasl?root=openvas&view=markup
IBM WebSphere Application Server (WAS) Multiple Vulnerabilities - March
2011

r10611 801862 gb_ibm_was_mult_vuln_mar11_01.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_ibm_was_mult_vuln_mar11_01.nasl?root=openvas&view=markup
IBM WebSphere Application Server (WAS) Multiple Vulnerabilities 01 -
March 2011

r10611 801863 gb_ibm_was_mult_vuln_mar11_02.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_ibm_was_mult_vuln_mar11_02.nasl?root=openvas&view=markup
IBM WebSphere Application Server (WAS) Multiple Vulnerabilities 02 -
March 2011

r10611 802008 gb_wordpress_php_speedy_plugin_code_exec_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_wordpress_php_speedy_plugin_code_exec_vuln.nasl?root=openvas&view=markup
WordPress PHP Speedy Plugin 'page' Parameter Remote PHP Code Execution
Vulnerability

r10611 801908 gb_wordpress_processing_embed_plugin_xss.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_wordpress_processing_embed_plugin_xss.nasl?root=openvas&view=markup
WordPress Processing Embed Plugin 'pluginurl' Parameter Cross Site
Scripting Vulnerability

r10611 801764 gb_pidgin_ymsg_dos_vuln_win.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_pidgin_ymsg_dos_vuln_win.nasl?root=openvas&view=markup
Pidgin Yahoo Protocol 'YMSG' NULL Pointer Dereference Denial of Service
Vulnerability (Win)

r10611 801867 gb_apple_safari_webkit_mult_vuln_mar11.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_apple_safari_webkit_mult_vuln_mar11.nasl?root=openvas&view=markup
Apple Safari Webkit Multiple Vulnerabilities - March 2011

r10611 801864 gb_ibm_was_sec_bypass_vuln_mar11.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_ibm_was_sec_bypass_vuln_mar11.nasl?root=openvas&view=markup
IBM WebSphere Application Server (WAS) Security Bypass Vulnerability -
March 2011

== Metasploit modules (1) ==

r12067 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/linux/http/drb_syscall_linux_32.rb
Distributed Ruby send syscall vulnerability.

== Nessus plugins (12) ==

52752 suse_java-1_6_0-ibm-7369.nasl
http://nessus.org/plugins/index.php?view=single&id=52752
SuSE Security Update: Security update for java-1_6_0-ibm,
java-1_6_0-ibm-32bit, java-1_6_0-ibm-64bit, java-1_6_0-ibm-alsa,
java-1_6_0-ibm-alsa-32bit, java-1_6_0-ibm-demo, java-1_6_0-ibm-devel,
java-1_6_0-ibm-devel-32bit, java-1_6_0-ibm-fonts, java-1_6_0-ibm-jdbc,
java-1_6_0-ibm-jdbc-32bit, java-1_6_0-ibm-jdbc-64bit,
java-1_6_0-ibm-plugin, java-1_6_0-ibm-plugin-32bit, java-1_6_0-ibm-src
(java-1_6_0-ibm-7369)

52751 suse_11_java-1_6_0-ibm-110307.nasl
http://nessus.org/plugins/index.php?view=single&id=52751
SuSE Security Update: java-1_6_0-ibm (2011-03-07)

52750 redhat-RHSA-2011-0370.nasl
http://nessus.org/plugins/index.php?view=single&id=52750
RHSA-2011-0370: wireshark

52749 redhat-RHSA-2011-0369.nasl
http://nessus.org/plugins/index.php?view=single&id=52749
RHSA-2011-0369: wireshark

52748 mandriva_MDVSA-2011-050.nasl
http://nessus.org/plugins/index.php?view=single&id=52748
MDVSA-2011:050: pidgin

52747 mandriva_MDVSA-2011-049.nasl
http://nessus.org/plugins/index.php?view=single&id=52747
MDVSA-2011:049: vsftpd

52746 fedora_2011-3547.nasl
http://nessus.org/plugins/index.php?view=single&id=52746
Fedora 15 2011-3547

52745 fedora_2011-3408.nasl
http://nessus.org/plugins/index.php?view=single&id=52745
Fedora 15 2011-3408

52744 fedora_2011-2125.nasl
http://nessus.org/plugins/index.php?view=single&id=52744
Fedora 13 2011-2125

52743 fedora_2011-2102.nasl
http://nessus.org/plugins/index.php?view=single&id=52743
Fedora 14 2011-2102

52742 fedora_2011-2030.nasl
http://nessus.org/plugins/index.php?view=single&id=52742
Fedora 15 2011-2030

52741 debian_DSA-2197.nasl
http://nessus.org/plugins/index.php?view=single&id=52741
[DSA2197] DSA-2197-1 quagga
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: