Nmap Development mailing list archives

New VA Modules: OpenVAS: 5, MSF: 4, Nessus: 6


From: New VA Module Alert Service <postmaster () insecure org>
Date: Tue, 15 Nov 2011 10:01:00 -0800 (PST)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== OpenVAS plugins (5) ==

r12115 103332 gb_cms_made_simple_50659.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_cms_made_simple_50659.nasl?root=openvas&view=markup
CMS Made Simple Remote Database Corruption Vulnerability

r12115 103331 gb_proftpd_50631.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_proftpd_50631.nasl?root=openvas&view=markup
ProFTPD Prior To 1.3.3g Use-After-Free Remote Code Execution
Vulnerability

r12115 103330 gb_labwiki_50608.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_labwiki_50608.nasl?root=openvas&view=markup
LabWiki Multiple Cross Site Scripting And Arbitrary File Upload
Vulnerabilities

r12115 103319 gb_cacti_50671.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_cacti_50671.nasl?root=openvas&view=markup
Cacti Unspecified SQL Injection and Cross Site Scripting Vulnerabilities

r12115 103333 gb_apache_50639.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_apache_50639.nasl?root=openvas&view=markup
Apache HTTP Server 'ap_pregsub()' Function Local Denial of Service
Vulnerability

== Metasploit modules (4) ==

r14263 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/wlan/wlan_bss_list.rb
Windows Gather Wireless BSS Info

r14263 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/wlan/wlan_disconnect.rb
Windows Disconnect Wireless Connection

r14263 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/wlan/wlan_profile.rb
Windows Gather Wireless Profile

r14263 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/wlan/wlan_current_connection.rb
Windows Gather Wireless Current Connection Info

== Nessus plugins (6) ==

56817 ubuntu_USN-1260-1.nasl
http://nessus.org/plugins/index.php?view=single&id=56817
USN-1260-1 : linux-ti-omap4 vulnerability

56816 freebsd_pkg_d8c901ff0f0f11e1902b20cf30e32f6d.nasl
http://nessus.org/plugins/index.php?view=single&id=56816
FreeBSD : Apache 1.3 -- mod_proxy reverse proxy exposure
(d8c901ff-0f0f-11e1-902b-20cf30e32f6d)

56815 fedora_2011-15338.nasl
http://nessus.org/plugins/index.php?view=single&id=56815
Fedora 14 2011-15338

56814 fedora_2011-15328.nasl
http://nessus.org/plugins/index.php?view=single&id=56814
Fedora 15 2011-15328

56813 fedora_2011-15290.nasl
http://nessus.org/plugins/index.php?view=single&id=56813
Fedora 16 2011-15290

novell_messenger_memory_disclosure_remote.nbin
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: