Nmap Development mailing list archives
New VA Modules: OpenVAS: 5, MSF: 4, Nessus: 6
From: New VA Module Alert Service <postmaster () insecure org>
Date: Tue, 15 Nov 2011 10:01:00 -0800 (PST)
This report describes any new scripts/modules/exploits added to Nmap, OpenVAS, Metasploit, and Nessus since yesterday. == OpenVAS plugins (5) == r12115 103332 gb_cms_made_simple_50659.nasl http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_cms_made_simple_50659.nasl?root=openvas&view=markup CMS Made Simple Remote Database Corruption Vulnerability r12115 103331 gb_proftpd_50631.nasl http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_proftpd_50631.nasl?root=openvas&view=markup ProFTPD Prior To 1.3.3g Use-After-Free Remote Code Execution Vulnerability r12115 103330 gb_labwiki_50608.nasl http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_labwiki_50608.nasl?root=openvas&view=markup LabWiki Multiple Cross Site Scripting And Arbitrary File Upload Vulnerabilities r12115 103319 gb_cacti_50671.nasl http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_cacti_50671.nasl?root=openvas&view=markup Cacti Unspecified SQL Injection and Cross Site Scripting Vulnerabilities r12115 103333 gb_apache_50639.nasl http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_apache_50639.nasl?root=openvas&view=markup Apache HTTP Server 'ap_pregsub()' Function Local Denial of Service Vulnerability == Metasploit modules (4) == r14263 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/wlan/wlan_bss_list.rb Windows Gather Wireless BSS Info r14263 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/wlan/wlan_disconnect.rb Windows Disconnect Wireless Connection r14263 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/wlan/wlan_profile.rb Windows Gather Wireless Profile r14263 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/wlan/wlan_current_connection.rb Windows Gather Wireless Current Connection Info == Nessus plugins (6) == 56817 ubuntu_USN-1260-1.nasl http://nessus.org/plugins/index.php?view=single&id=56817 USN-1260-1 : linux-ti-omap4 vulnerability 56816 freebsd_pkg_d8c901ff0f0f11e1902b20cf30e32f6d.nasl http://nessus.org/plugins/index.php?view=single&id=56816 FreeBSD : Apache 1.3 -- mod_proxy reverse proxy exposure (d8c901ff-0f0f-11e1-902b-20cf30e32f6d) 56815 fedora_2011-15338.nasl http://nessus.org/plugins/index.php?view=single&id=56815 Fedora 14 2011-15338 56814 fedora_2011-15328.nasl http://nessus.org/plugins/index.php?view=single&id=56814 Fedora 15 2011-15328 56813 fedora_2011-15290.nasl http://nessus.org/plugins/index.php?view=single&id=56813 Fedora 16 2011-15290 novell_messenger_memory_disclosure_remote.nbin _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- New VA Modules: OpenVAS: 5, MSF: 4, Nessus: 6 New VA Module Alert Service (Nov 15)