Nmap Development mailing list archives

New VA Modules: NSE: 2, OpenVAS: 2, MSF: 2, Nessus: 18


From: New VA Module Alert Service <postmaster () insecure org>
Date: Wed, 30 May 2012 10:00:37 -0700 (PDT)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== Nmap Scripting Engine scripts (2) ==

r28754 isns-info http://nmap.org/nsedoc/scripts/isns-info.html
https://svn.nmap.org/nmap/scripts/isns-info.nse
Lists portals and iSCSI nodes registered with the Internet Storage Name
Service (iSNS).

r28755 eppc-enum-processes http://nmap.org/nsedoc/scripts/eppc-enum-processes.html
https://svn.nmap.org/nmap/scripts/eppc-enum-processes.nse
Attempt to enumerate process info over the Apple Remote Event protocol.
When accessing an application over the Apple Remote Event protocol the
service responds with the uid and pid of the application, if it is
running, prior to requesting authentication.

== OpenVAS plugins (2) ==

r13520 902840 secpod_loganalyzer_sql_inj_n_xss_vuln.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/secpod_loganalyzer_sql_inj_n_xss_vuln.nasl?root=openvas&view=markup
Adiscon LogAnalyzer Multiple SQL Injection and XSS Vulnerabilities

r13520 secpod_windows_messenger_detect.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/secpod_windows_messenger_detect.nasl?root=openvas&view=markup
Microsoft MSN Messenger Service Version Detection

== Metasploit modules (2) ==

r15346 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/fileformat/mplayer_sami_bof.rb
MPlayer SAMI Subtitle File Buffer Overflow

r15353 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/multi/http/php_volunteer_upload_exec.rb
PHP Volunteer Management System v1.0.2 Arbitrary File Upload
Vulnerability

== Nessus plugins (18) ==

59309 ubuntu_USN-1455-1.nasl
http://nessus.org/plugins/index.php?view=single&id=59309
USN-1455-1 : linux-lts-backport-oneiric vulnerabilities

59308 suse_python-pam-8031.nasl
http://nessus.org/plugins/index.php?view=single&id=59308
SuSE 10 Security Update : python-pam (ZYPP Patch Number 8031)

59307 redhat-RHSA-2012-0699.nasl
http://nessus.org/plugins/index.php?view=single&id=59307
RHSA-2012-0699: openssl

59306 redhat-RHSA-2012-0690.nasl
http://nessus.org/plugins/index.php?view=single&id=59306
RHSA-2012-0690: kernel

59305 mandriva_MDVSA-2012-084.nasl
http://nessus.org/plugins/index.php?view=single&id=59305
MDVSA-2012:084 : ncpfs

59304 mandriva_MDVSA-2012-083.nasl
http://nessus.org/plugins/index.php?view=single&id=59304
MDVSA-2012:083 : util-linux

59303 mandriva_MDVA-2012-046.nasl
http://nessus.org/plugins/index.php?view=single&id=59303
MDVA-2012:046 : initscripts

59302 freebsd_pkg_359f615da9e111e18a6614dae9ebcf89.nasl
http://nessus.org/plugins/index.php?view=single&id=59302
FreeBSD : asterisk -- multiple vulnerabilities
(359f615d-a9e1-11e1-8a66-14dae9ebcf89)

59301 fedora_2012-8217.nasl
http://nessus.org/plugins/index.php?view=single&id=59301
Fedora 16 2012-8217

59300 fedora_2012-8205.nasl
http://nessus.org/plugins/index.php?view=single&id=59300
Fedora 15 2012-8205

59299 fedora_2012-8194.nasl
http://nessus.org/plugins/index.php?view=single&id=59299
Fedora 17 2012-8194

59298 fedora_2012-8061.nasl
http://nessus.org/plugins/index.php?view=single&id=59298
Fedora 16 2012-8061

59297 fedora_2012-8041.nasl
http://nessus.org/plugins/index.php?view=single&id=59297
Fedora 15 2012-8041

59296 fedora_2012-7998.nasl
http://nessus.org/plugins/index.php?view=single&id=59296
Fedora 17 2012-7998

59295 fedora_2012-7939.nasl
http://nessus.org/plugins/index.php?view=single&id=59295
Fedora 17 2012-7939

59294 centos_RHSA-2012-0699.nasl
http://nessus.org/plugins/index.php?view=single&id=59294
CentOS : RHSA-2012-0699

59293 ibm_rational_clearquest_maintenance_tool_sql_injection.nasl
http://nessus.org/plugins/index.php?view=single&id=59293
IBM Rational ClearQuest User Database Upgrading Unspecified SQL
Injection

wmi_malware_scan.nbin
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: