Nmap Development mailing list archives
New VA Modules: OpenVAS: 3, MSF: 2, Nessus: 9
From: New VA Module Alert Service <postmaster () insecure org>
Date: Tue, 13 Sep 2011 10:00:57 -0700 (PDT)
This report describes any new scripts/modules/exploits added to Nmap, OpenVAS, Metasploit, and Nessus since yesterday. == OpenVAS plugins (3) == r11605 802156 gb_sunway_force_control_webserver_bof_vuln.nasl http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_sunway_force_control_webserver_bof_vuln.nasl?root=openvas&view=markup Sunway ForceControl WebServer 'httpsvr.exe' Buffer Overflow Vulnerability r11605 801973 gb_tcptrack_long_command_bof_vuln.nasl http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_tcptrack_long_command_bof_vuln.nasl?root=openvas&view=markup Tcptrack Command Line Parsing Heap Based Buffer Overflow Vulnerability r11605 801972 gb_tcptrack_detect.nasl http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_tcptrack_detect.nasl?root=openvas&view=markup Tcptrack Version Detection == Metasploit modules (2) == r13721 http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/scada/procyon_core_server.rb Procyon Core Server HMI <= v1.13 Coreservice.exe Stack Buffer Overflow r13725 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/gather/wmic_command.rb Windows Gather Run Specified WMIC command == Nessus plugins (9) == 56170 redhat-RHSA-2011-1282.nasl http://nessus.org/plugins/index.php?view=single&id=56170 RHSA-2011-1282: nspr 56169 freebsd_pkg_b9f3ffa3dd6c11e0b7fc000a5e1e33c6.nasl http://nessus.org/plugins/index.php?view=single&id=56169 FreeBSD : libsndfile -- PAF file processing integer overflow (5483) 56168 freebsd_pkg_4ae68e7cdda411e0a90600215c6a37bb.nasl http://nessus.org/plugins/index.php?view=single&id=56168 FreeBSD : roundcube -- XSS vulnerability (5482) 56167 debian_DSA-2308.nasl http://nessus.org/plugins/index.php?view=single&id=56167 [DSA2308] DSA-2308-1 mantis 56166 hpca_command_execution.nasl http://nessus.org/plugins/index.php?view=single&id=56166 HP Client Automation radexecd.exe Remote Command Execution 56165 hp_client_automation_satellite_detect.nasl http://nessus.org/plugins/index.php?view=single&id=56165 HP Client Automation Satellite Web Console Detection 56164 wireshark_1_6_2.nasl http://nessus.org/plugins/index.php?view=single&id=56164 Wireshark 1.6.x < 1.6.2 Multiple Vulnerabilities 56163 wireshark_1_4_9.nasl http://nessus.org/plugins/index.php?view=single&id=56163 Wireshark 1.4.x < 1.4.9 Multiple Vulnerabilities 56162 openssl_1_0_0e.nasl http://nessus.org/plugins/index.php?view=single&id=56162 OpenSSL 1.x < 1.0.0e Multiple Vulnerabilities _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- New VA Modules: OpenVAS: 3, MSF: 2, Nessus: 9 New VA Module Alert Service (Sep 13)