Nmap Development mailing list archives

New VA Modules: OpenVAS: 11, MSF: 2, Nessus: 4


From: New VA Module Alert Service <postmaster () insecure org>
Date: Fri, 26 Aug 2011 10:01:09 -0700 (PDT)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== OpenVAS plugins (11) ==

r11509 103228 gb_asus_rt-n56u_49308.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_asus_rt-n56u_49308.nasl?root=openvas&view=markup
ASUS RT-N56U Wireless Router 'QIS_wizard.htm' Password Information
Disclosure Vulnerability

r11510 902722 secpod_wireshark_ike_packet_dos_vuln_win.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_wireshark_ike_packet_dos_vuln_win.nasl?root=openvas&view=markup
Wireshark IKE Packet Denial of Service Vulnerability (Win)

r11510 902723 secpod_wordpress_wp_css_lfi_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_wordpress_wp_css_lfi_vuln.nasl?root=openvas&view=markup
WordPress 'WP CSS' Plugin Local File Inclusion Vulnerability

r11510 902718 secpod_itunes_mult_vuln_macosx.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_itunes_mult_vuln_macosx.nasl?root=openvas&view=markup
Apple iTunes Multiple Vulnerabilities (Mac OS X)

r11510 901203 secpod_apache_http_srv_range_header_dos_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_apache_http_srv_range_header_dos_vuln.nasl?root=openvas&view=markup
Apache httpd Web Server Range Header Denial of Service Vulnerability

r11510 902553 secpod_macosx_java_10_5_upd_10.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_macosx_java_10_5_upd_10.nasl?root=openvas&view=markup
Java for Mac OS X 10.5 Update 10

r11510 902717 secpod_itunes_detect_macosx.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_itunes_detect_macosx.nasl?root=openvas&view=markup
Apple iTunes Version Detection (Mac OS X)

r11510 902469 secpod_manageengine_servicedesk_plus_mult_xss_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_manageengine_servicedesk_plus_mult_xss_vuln.nasl?root=openvas&view=markup
ManageEngine ServiceDesk Plus Multiple Stored XSS Vulnerabilities

r11510 902554 secpod_macosx_java_10_6_upd_5.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_macosx_java_10_6_upd_5.nasl?root=openvas&view=markup
Java for Mac OS X 10.6 Update 5

r11510 902721 secpod_wireshark_ansi_map_dos_vuln_win.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_wireshark_ansi_map_dos_vuln_win.nasl?root=openvas&view=markup
Wireshark ANSI A MAP Files Denial of Service Vulnerability (Win)

r11510 902470 secpod_macosx_su11-001.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_macosx_su11-001.nasl?root=openvas&view=markup
Mac OS X v10.6.6 Multiple Vulnerabilities (2011-001)

== Metasploit modules (2) ==

r13636 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/multi/general/close.rb
Multi Generic Operating System Session Close

r13641 http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/multi/vnc/realvnc_41_bypass.rb
RealVNC Authentication Bypass

== Nessus plugins (4) ==

55979 sitecore_cms_uri_param_url_redirect.nasl
http://nessus.org/plugins/index.php?view=single&id=55979
Sitecore CMS < 6.4.1 rev.110720 'url' Parameter URI Redirection

55978 sitecore_cms_detect.nasl
http://nessus.org/plugins/index.php?view=single&id=55978
Sitecore CMS Detection

55977 sitecore_cms_default_aspx_xss.nasl
http://nessus.org/plugins/index.php?view=single&id=55977
Sitecore CMS 'default.aspx' Cross-Site Scripting Vulnerability

55976 apache_range_dos.nasl
http://nessus.org/plugins/index.php?view=single&id=55976
Apache HTTP Server Byte Range DoS
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: