Nmap Development mailing list archives

New VA Modules: OpenVAS: 27, MSF: 1, Nessus: 20


From: New VA Module Alert Service <postmaster () insecure org>
Date: Fri, 22 Jul 2011 10:02:11 -0700 (PDT)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== OpenVAS plugins (27) ==

r11362 902396 secpod_justsystems_ichitaro_prdts_dos_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_justsystems_ichitaro_prdts_dos_vuln.nasl?root=openvas&view=markup
JustSystems Ichitaro Products Denial of Service Vulnerability

r11362 801959 gb_novell_file_reporter_engine_bof_vuln_win.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_novell_file_reporter_engine_bof_vuln_win.nasl?root=openvas&view=markup
Novell File Reporter Engine 'RECORD' Processing Buffer Overflow
Vulnerability

r11362 902397 secpod_joomla_com_xmap_sql_inj_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_joomla_com_xmap_sql_inj_vuln.nasl?root=openvas&view=markup
Joomla com_xmap SQL Injection Vulnerability

r11362 902610 secpod_ibm_was_admin_console_csrf_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_ibm_was_admin_console_csrf_vuln.nasl?root=openvas&view=markup
IBM WebSphere Application Server Multiple CSRF Vulnerabilities

r11362 902456 secpod_oracle_glassfish_server_xss_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_oracle_glassfish_server_xss_vuln.nasl?root=openvas&view=markup
Oracle GlassFish Server Cross-Site Scripting Vulnerability

r11362 802224 gb_ibm_tivoli_dir_server_mult_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_ibm_tivoli_dir_server_mult_vuln.nasl?root=openvas&view=markup
IBM Tivoli Directory Server Multiple Vulnerabilities

r11362 802127 gb_google_chrome_getwidget_dos_vuln_lin.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_google_chrome_getwidget_dos_vuln_lin.nasl?root=openvas&view=markup
Google Chrome 'GetWidget' methods DoS Vulnerability (Linux)

r11362 802125 gb_joomla_com_foto_sql_inj_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_joomla_com_foto_sql_inj_vuln.nasl?root=openvas&view=markup
Joomla com_foto SQL Injection Vulnerability

r11362 902539 secpod_myre_real_estate_sql_inj_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_myre_real_estate_sql_inj_vuln.nasl?root=openvas&view=markup
MYRE Real Estate Software URL SQL Injection Vulnerability

r11362 802124 gb_joomla_com_yvhotels_sql_inj_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_joomla_com_yvhotels_sql_inj_vuln.nasl?root=openvas&view=markup
Joomla com_yvhotels SQL Injection Vulnerability

r11362 802030 gb_freefloat_ftp_abor_cmd_bof_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_freefloat_ftp_abor_cmd_bof_vuln.nasl?root=openvas&view=markup
Freefloat FTP Server POST Auth 'ABOR' Command Buffer Overflow
Vulnerability

r11362 802126 gb_google_chrome_getwidget_dos_vuln_win.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_google_chrome_getwidget_dos_vuln_win.nasl?root=openvas&view=markup
Google Chrome 'GetWidget' methods DoS Vulnerability (Windows)

r11362 902540 secpod_vbulletin_search_mult_sql_inj_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_vbulletin_search_mult_sql_inj_vuln.nasl?root=openvas&view=markup
vBulletin Search UI Multiple SQL Injection Vulnerabilities

r11362 801960 gb_novell_file_reporter_files_del_vuln_win.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_novell_file_reporter_files_del_vuln_win.nasl?root=openvas&view=markup
Novell File Reporter 'SRS' Tag Arbitrary File Deletion Vulnerability

r11363 870457 gb_RHSA-2011_1005-01_sysstat.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_RHSA-2011_1005-01_sysstat.nasl?root=openvas&view=markup
RedHat Update for sysstat RHSA-2011:1005-01

r11363 870456 gb_RHSA-2011_0975-01_sssd.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_RHSA-2011_0975-01_sssd.nasl?root=openvas&view=markup
RedHat Update for sssd RHSA-2011:0975-01

r11363 863367 gb_fedora_2011_9343_libpng_fc15.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_fedora_2011_9343_libpng_fc15.nasl?root=openvas&view=markup
Fedora Update for libpng FEDORA-2011-9343

r11363 863366 gb_fedora_2011_9139_thunderbird_fc15.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_fedora_2011_9139_thunderbird_fc15.nasl?root=openvas&view=markup
Fedora Update for thunderbird FEDORA-2011-9139

r11363 840706 gb_ubuntu_USN_1171_1.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_ubuntu_USN_1171_1.nasl?root=openvas&view=markup
Ubuntu Update for likewise-open USN-1171-1

r11363 831425 gb_mandriva_MDVA_2011_025.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_mandriva_MDVA_2011_025.nasl?root=openvas&view=markup
Mandriva Update for mysql MDVA-2011:025 (mysql)

r11363 831424 gb_mandriva_MDVSA_2011_112.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_112.nasl?root=openvas&view=markup
Mandriva Update for blender MDVSA-2011:112 (blender)

r11363 840705 gb_ubuntu_USN_1172_1.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_ubuntu_USN_1172_1.nasl?root=openvas&view=markup
Ubuntu Update for logrotate USN-1172-1

r11363 870458 gb_RHSA-2011_1073-01_bash.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_RHSA-2011_1073-01_bash.nasl?root=openvas&view=markup
RedHat Update for bash RHSA-2011:1073-01

r11363 831427 gb_mandriva_MDVSA_2011_114.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_114.nasl?root=openvas&view=markup
Mandriva Update for blender MDVSA-2011:114 (blender)

r11363 870455 gb_RHSA-2011_0999-01_rsync.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_RHSA-2011_0999-01_rsync.nasl?root=openvas&view=markup
RedHat Update for rsync RHSA-2011:0999-01

r11363 831426 gb_mandriva_MDVSA_2011_115.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2011_115.nasl?root=openvas&view=markup
Mandriva Update for bind MDVSA-2011:115 (bind)

r11363 870454 gb_RHSA-2011_1065-01_Red_Hat_Enterprise_Linux_5.7_kernel.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_RHSA-2011_1065-01_Red_Hat_Enterprise_Linux_5.7_kernel.nasl?root=openvas&view=markup
RedHat Update for Red Hat Enterprise Linux 5.7 kernel RHSA-2011:1065-01

== Metasploit modules (1) ==

r13289 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/gather/enum_smartftp_pwd.rb
Windows Gather SmartFTP Saved Password Extraction

== Nessus plugins (20) ==

55648 ubuntu_USN-1172-1.nasl
http://nessus.org/plugins/index.php?view=single&id=55648
USN-1172-1 : logrotate vulnerabilities

55647 redhat-RHSA-2011-1085.nasl
http://nessus.org/plugins/index.php?view=single&id=55647
RHSA-2011-1085: freetype

55646 redhat-RHSA-2011-1073.nasl
http://nessus.org/plugins/index.php?view=single&id=55646
RHSA-2011-1073: bash

55645 redhat-RHSA-2011-1065.nasl
http://nessus.org/plugins/index.php?view=single&id=55645
RHSA-2011-1065: kernel

55644 redhat-RHSA-2011-1005.nasl
http://nessus.org/plugins/index.php?view=single&id=55644
RHSA-2011-1005: sysstat

55643 redhat-RHSA-2011-0999.nasl
http://nessus.org/plugins/index.php?view=single&id=55643
RHSA-2011-0999: rsync

55642 redhat-RHSA-2011-0975.nasl
http://nessus.org/plugins/index.php?view=single&id=55642
RHSA-2011-0975: sssd

55641 debian_DSA-2281.nasl
http://nessus.org/plugins/index.php?view=single&id=55641
[DSA2281] DSA-2281-1 opie

55640 web_accessible_sql_files.nasl
http://nessus.org/plugins/index.php?view=single&id=55640
SQL Dump Files Disclosed via Web Server

55639 safari_5_1.nasl
http://nessus.org/plugins/index.php?view=single&id=55639
Safari < 5.1 Multiple Vulnerabilities

55638 macosx_Safari5_1.nasl
http://nessus.org/plugins/index.php?view=single&id=55638
Mac OS X : Safari < 5.1 / 5.0.6

55637 ubuntu_USN-1171-1.nasl
http://nessus.org/plugins/index.php?view=single&id=55637
USN-1171-1 : likewise-open vulnerability

55636 redhat-RHSA-2011-1084.nasl
http://nessus.org/plugins/index.php?view=single&id=55636
RHSA-2011-1084: libsndfile

55635 redhat-RHSA-2011-1083.nasl
http://nessus.org/plugins/index.php?view=single&id=55635
RHSA-2011-1083: fuse

55634 mandriva_MDVSA-2011-115.nasl
http://nessus.org/plugins/index.php?view=single&id=55634
MDVSA-2011:115 : bind

55633 freebsd_pkg_9a777c23b31011e0832d00215c6a37bb.nasl
http://nessus.org/plugins/index.php?view=single&id=55633
FreeBSD : rsync -- incremental recursion memory corruption vulnerability
(5455)

55632 oracle_rdbms_cpu_jul_2011.nasl
http://nessus.org/plugins/index.php?view=single&id=55632
Oracle Database, July 2011 Critical Patch Update

55629 symantec_web_gateway_sym11-008.nasl
http://nessus.org/plugins/index.php?view=single&id=55629
Symantec Web Gateway forget.php Blind SQL Injection (SYM11-008)

55628 symantec_web_gateway_sym11-001.nasl
http://nessus.org/plugins/index.php?view=single&id=55628
Symantec Web Gateway login.php Blind SQL Injection (SYM11-001)

55627 symantec_web_gateway_detect.nasl
http://nessus.org/plugins/index.php?view=single&id=55627
Symantec Web Gateway Detection
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: