Nmap Development mailing list archives

New VA Modules: Nessus: 10


From: New VA Module Alert Service <postmaster () insecure org>
Date: Sat, 29 Sep 2012 10:00:15 -0700 (PDT)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== Nessus plugins (10) ==

62376 cisco-sa-20120926-sip.nasl
http://nessus.org/plugins/index.php?view=single&id=62376
Cisco IOS Software Session Initiation Protocol Denial of Service
Vulnerability (cisco-sa-20120926-sip)

62375 cisco-sa-20120926-nat.nasl
http://nessus.org/plugins/index.php?view=single&id=62375
Cisco IOS Software Network Address Translation Vulnerabilities
(cisco-sa-20120926-nat)

62374 cisco-sa-20120926-ios-ips.nasl
http://nessus.org/plugins/index.php?view=single&id=62374
Cisco IOS Software Intrusion Prevention System Denial of Service
Vulnerability (cisco-sa-20120926-ios-ips)

62373 cisco-sa-20120926-dhcpv6.nasl
http://nessus.org/plugins/index.php?view=single&id=62373
Cisco IOS Software DHCP Version 6 Server Denial of Service Vulnerability
(cisco-sa-20120926-dhcpv6)

62372 cisco-sa-20120926-dhcp.nasl
http://nessus.org/plugins/index.php?view=single&id=62372
Cisco IOS Software DHCP Denial of Service Vulnerability
(cisco-sa-20120926-dhcp)

62371 cisco-sa-20120926-c10k-tunnels.nasl
http://nessus.org/plugins/index.php?view=single&id=62371
Cisco IOS Software Tunneled Traffic Queue Wedge Vulnerability

62370 cisco-sa-20120926-bgp.nasl
http://nessus.org/plugins/index.php?view=single&id=62370
Cisco IOS Software Malformed Border Gateway Protocol Attribute
Vulnerability (cisco-sa-20120926-bgp)

62369 db2_101fp1.nasl
http://nessus.org/plugins/index.php?view=single&id=62369
DB2 10.1 < Fix Pack 1 Multiple Vulnerabilities

62368 mediawiki_uselang_xss.nasl
http://nessus.org/plugins/index.php?view=single&id=62368
MediaWiki index.php uselang Parameter XSS

62367 zen_load_balancer_information_disclosure.nasl
http://nessus.org/plugins/index.php?view=single&id=62367
ZEN Load Balancer global.conf Information Disclosure
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: