Nmap Development mailing list archives

New VA Modules: OpenVAS: 2, Nessus: 14


From: New VA Module Alert Service <postmaster () insecure org>
Date: Tue, 24 Jul 2012 10:00:28 -0700 (PDT)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== OpenVAS plugins (2) ==

r13776 gb_symantec_web_gateway_54429.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_symantec_web_gateway_54429.nasl?root=openvas&view=markup
Symantec Web Gateway Local File Manipulation Authentication Bypass
Vulnerability

r13776 gb_atmail_WebAdmin_sql_root_password_disclosure.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_atmail_WebAdmin_sql_root_password_disclosure.nasl?root=openvas&view=markup
Atmail WebAdmin and Webmail Control Panel SQL Root Password Disclosure

== Nessus plugins (14) ==

60106 ubuntu_USN-1515-1.nasl
http://nessus.org/plugins/index.php?view=single&id=60106
USN-1515-1 : linux vulnerability

60105 ubuntu_USN-1513-1.nasl
http://nessus.org/plugins/index.php?view=single&id=60105
USN-1513-1 : libexif vulnerabilities

60104 suse_libxslt-8207.nasl
http://nessus.org/plugins/index.php?view=single&id=60104
SuSE 10 Security Update : libxslt (ZYPP Patch Number 8207)

60103 suse_libexif-8224.nasl
http://nessus.org/plugins/index.php?view=single&id=60103
SuSE 10 Security Update : libexif (ZYPP Patch Number 8224)

60102 freebsd_pkg_bdab0acdd4cd11e18a1c14dae9ebcf89.nasl
http://nessus.org/plugins/index.php?view=single&id=60102
FreeBSD : php -- potential overflow in _php_stream_scandir
(bdab0acd-d4cd-11e1-8a1c-14dae9ebcf89)

60101 freebsd_pkg_748aa89fd52911e182ab001fd0af1a4c.nasl
http://nessus.org/plugins/index.php?view=single&id=60101
FreeBSD : rubygem-activerecord -- multiple vulnerabilities
(748aa89f-d529-11e1-82ab-001fd0af1a4c)

60100 wordpress_3_4_1.nasl
http://nessus.org/plugins/index.php?view=single&id=60100
WordPress < 3.4.1 Multiple Vulnerabilities

60099 nagiosxi_2011r3_0.nasl
http://nessus.org/plugins/index.php?view=single&id=60099
Nagios XI < 2011R3.0 Multiple XSS Vulnerabilities

60098 db2_9fp12.nasl
http://nessus.org/plugins/index.php?view=single&id=60098
DB2 9.1 < Fix Pack 12 Multiple Vulnerabilities

60097 serendipity_comment_url_sql_injection.nasl
http://nessus.org/plugins/index.php?view=single&id=60097
Serendipity comment.php url Parameter SQL Injection

60096 struts_showcase_xss.nasl
http://nessus.org/plugins/index.php?view=single&id=60096
Apache Struts struts2-showcase edit-person.action Persistent XSS

60095 struts_rest_showcase_xss.nasl
http://nessus.org/plugins/index.php?view=single&id=60095
Apache Struts struts2-rest-showcase orders clientName Parameter
Persistent XSS

60094 struts_examples_xss.nasl
http://nessus.org/plugins/index.php?view=single&id=60094
Apache Struts struts-examples upload-submit.do theText Parameter XSS

60093 struts_cookbook_xss.nasl
http://nessus.org/plugins/index.php?view=single&id=60093
Apache Struts struts-cookbook processSimple.do message Parameter XSS
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: