Nmap Development mailing list archives

New VA Modules: OpenVAS: 3, MSF: 2, Nessus: 9


From: New VA Module Alert Service <postmaster () insecure org>
Date: Tue, 13 Sep 2011 10:00:57 -0700 (PDT)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== OpenVAS plugins (3) ==

r11605 802156 gb_sunway_force_control_webserver_bof_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_sunway_force_control_webserver_bof_vuln.nasl?root=openvas&view=markup
Sunway ForceControl WebServer 'httpsvr.exe' Buffer Overflow
Vulnerability

r11605 801973 gb_tcptrack_long_command_bof_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_tcptrack_long_command_bof_vuln.nasl?root=openvas&view=markup
Tcptrack Command Line Parsing Heap Based Buffer Overflow Vulnerability

r11605 801972 gb_tcptrack_detect.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_tcptrack_detect.nasl?root=openvas&view=markup
Tcptrack Version Detection

== Metasploit modules (2) ==

r13721 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/scada/procyon_core_server.rb
Procyon Core Server HMI <= v1.13 Coreservice.exe Stack Buffer Overflow

r13725 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/gather/wmic_command.rb
Windows Gather Run Specified WMIC command

== Nessus plugins (9) ==

56170 redhat-RHSA-2011-1282.nasl
http://nessus.org/plugins/index.php?view=single&id=56170
RHSA-2011-1282: nspr

56169 freebsd_pkg_b9f3ffa3dd6c11e0b7fc000a5e1e33c6.nasl
http://nessus.org/plugins/index.php?view=single&id=56169
FreeBSD : libsndfile -- PAF file processing integer overflow (5483)

56168 freebsd_pkg_4ae68e7cdda411e0a90600215c6a37bb.nasl
http://nessus.org/plugins/index.php?view=single&id=56168
FreeBSD : roundcube -- XSS vulnerability (5482)

56167 debian_DSA-2308.nasl
http://nessus.org/plugins/index.php?view=single&id=56167
[DSA2308] DSA-2308-1 mantis

56166 hpca_command_execution.nasl
http://nessus.org/plugins/index.php?view=single&id=56166
HP Client Automation radexecd.exe Remote Command Execution

56165 hp_client_automation_satellite_detect.nasl
http://nessus.org/plugins/index.php?view=single&id=56165
HP Client Automation Satellite Web Console Detection

56164 wireshark_1_6_2.nasl
http://nessus.org/plugins/index.php?view=single&id=56164
Wireshark 1.6.x < 1.6.2 Multiple Vulnerabilities

56163 wireshark_1_4_9.nasl
http://nessus.org/plugins/index.php?view=single&id=56163
Wireshark 1.4.x < 1.4.9 Multiple Vulnerabilities

56162 openssl_1_0_0e.nasl
http://nessus.org/plugins/index.php?view=single&id=56162
OpenSSL 1.x < 1.0.0e Multiple Vulnerabilities
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: