Nmap Development mailing list archives

New VA Modules: NSE: 1, OpenVAS: 8, MSF: 2, Nessus: 20


From: New VA Module Alert Service <postmaster () insecure org>
Date: Tue, 6 Mar 2012 10:00:52 -0800 (PST)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== Nmap Scripting Engine scripts (1) ==

r28217 http-config-backup http://nmap.org/nsedoc/scripts/http-config-backup.html
Checks for backups and swap files of common content management system
and web server configuration files.

== OpenVAS plugins (8) ==

r12958 103443 gb_open_realty_52296.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_open_realty_52296.nasl?root=openvas&view=markup
Open Realty 'select_users_template' Parameter Local File Include
Vulnerability

r12958 103442 gb_polycom_products_52301.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_polycom_products_52301.nasl?root=openvas&view=markup
Polycom Products Directory Traversal and Command Injection
Vulnerabilities

r12963 870572 gb_RHSA-2012_0321-01_cvs.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_RHSA-2012_0321-01_cvs.nasl?root=openvas&view=markup
RedHat Update for cvs RHSA-2012:0321-01

r12963 870568 gb_RHSA-2012_0322-01_java-1.6.0-openjdk.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_RHSA-2012_0322-01_java-1.6.0-openjdk.nasl?root=openvas&view=markup
RedHat Update for java-1.6.0-openjdk RHSA-2012:0322-01

r12963 870569 gb_RHSA-2012_0324-01_libxml2.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_RHSA-2012_0324-01_libxml2.nasl?root=openvas&view=markup
RedHat Update for libxml2 RHSA-2012:0324-01

r12963 902798 secpod_ms_smb_signing_enabled_not_req_at_server.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_ms_smb_signing_enabled_not_req_at_server.nasl?root=openvas&view=markup
Microsoft SMB Signing Enabled and Not Required At Server

r12963 870570 gb_RHSA-2012_0332-01_samba.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_RHSA-2012_0332-01_samba.nasl?root=openvas&view=markup
RedHat Update for samba RHSA-2012:0332-01

r12963 870571 gb_RHSA-2012_0323-01_httpd.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_RHSA-2012_0323-01_httpd.nasl?root=openvas&view=markup
RedHat Update for httpd RHSA-2012:0323-01

== Metasploit modules (2) ==

r14863 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/afp/afp_server_info.rb
Apple Filing Protocol Info Enumerator

r14869 http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/multi/http/lcms_php_exec.rb
LotusCMS 3.0 eval() Remote Command Execution

== Nessus plugins (20) ==

58223 ubuntu_USN-1382-1.nasl
http://nessus.org/plugins/index.php?view=single&id=58223
USN-1382-1 : lightdm vulnerability

58222 gentoo_GLSA-201203-12.nasl
http://nessus.org/plugins/index.php?view=single&id=58222
GLSA-201203-12 : OpenSSL: Multiple vulnerabilities

58221 gentoo_GLSA-201203-11.nasl
http://nessus.org/plugins/index.php?view=single&id=58221
GLSA-201203-11 : usbmuxd: User-assisted execution of arbitrary code

58220 gentoo_GLSA-201203-10.nasl
http://nessus.org/plugins/index.php?view=single&id=58220
GLSA-201203-10 : libmikmod: User-assisted execution of arbitrary code

58219 gentoo_GLSA-201203-09.nasl
http://nessus.org/plugins/index.php?view=single&id=58219
GLSA-201203-09 : ImageMagick: User-assisted execution of arbitrary code

58218 gentoo_GLSA-201203-08.nasl
http://nessus.org/plugins/index.php?view=single&id=58218
GLSA-201203-08 : libxslt: Denial of Service

58217 gentoo_GLSA-201203-07.nasl
http://nessus.org/plugins/index.php?view=single&id=58217
GLSA-201203-07 : foomatic-filters: User-assisted execution of arbitrary
code

58216 gentoo_GLSA-201203-06.nasl
http://nessus.org/plugins/index.php?view=single&id=58216
GLSA-201203-06 : sudo: Privilege escalation

58215 gentoo_GLSA-201203-05.nasl
http://nessus.org/plugins/index.php?view=single&id=58215
GLSA-201203-05 : Rack: Denial of Service

58214 gentoo_GLSA-201203-04.nasl
http://nessus.org/plugins/index.php?view=single&id=58214
GLSA-201203-04 : libxml2: Denial of Service

58213 gentoo_GLSA-201203-03.nasl
http://nessus.org/plugins/index.php?view=single&id=58213
GLSA-201203-03 : Puppet: Multiple vulnerabilities

58212 gentoo_GLSA-201203-02.nasl
http://nessus.org/plugins/index.php?view=single&id=58212
GLSA-201203-02 : cURL: Multiple vulnerabilities

58211 gentoo_GLSA-201203-01.nasl
http://nessus.org/plugins/index.php?view=single&id=58211
GLSA-201203-01 : spamdyke: Arbitrary code execution

58210 freebsd_pkg_99aef69866ed11e1828800262d5ed8ee.nasl
http://nessus.org/plugins/index.php?view=single&id=58210
FreeBSD : chromium -- multiple vulnerabilities
(99aef698-66ed-11e1-8288-00262d5ed8ee)

58209 citrix_xenserver_web_self_service_detect.nasl
http://nessus.org/plugins/index.php?view=single&id=58209
Citrix XenServer Web Self Service Detection

58208 macosx_flash_player_11_1_102_63.nasl
http://nessus.org/plugins/index.php?view=single&id=58208
Flash Player for Mac <= 10.3.183.15 / 11.1.102.62 Multiple
Vulnerabilities (APSB12-05)

58207 flash_player_apsb12-05.nasl
http://nessus.org/plugins/index.php?view=single&id=58207
Flash Player <= 10.3.183.15 / 11.1.102.62 Multiple Vulnerabilities
(APSB12-05)

58206 google_chrome_17_0_963_65.nasl
http://nessus.org/plugins/index.php?view=single&id=58206
Google Chrome < 17.0.963.65 Multiple Vulnerabilities

58205 fusion_web_services_2011_3569.nasl
http://nessus.org/plugins/index.php?view=single&id=58205
Oracle Fusion Middleware Web Services Manager Unspecified Remote
Information Disclosure

58204 symantec_pcanywhere_sym12-003.nasl
http://nessus.org/plugins/index.php?view=single&id=58204
Symantec pcAnywhere awhost32 Denial of Service (SYM12-003)
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: