Nmap Development mailing list archives

New VA Modules: OpenVAS: 18, MSF: 3, Nessus: 9


From: New VA Module Alert Service <postmaster () insecure org>
Date: Wed, 5 Dec 2012 10:01:25 -0800 (PST)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== OpenVAS plugins (18) ==

r14713 803123 gb_google_chrome_mult_vuln02_dec12_macosx.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln02_dec12_macosx.nasl?root=openvas&view=markup
Google Chrome Multiple Vulnerabilities-02 Dec2012 (Mac OS X)

r14713 803118 gb_google_chrome_mult_vuln01_dec12_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln01_dec12_win.nasl?root=openvas&view=markup
Google Chrome Multiple Vulnerabilities-01 Dec2012 (Windows)

r14713 803121 gb_google_chrome_mult_vuln02_dec12_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln02_dec12_win.nasl?root=openvas&view=markup
Google Chrome Multiple Vulnerabilities-02 Dec2012 (Windows)

r14713 802680 gb_oracle_java_se_murmurhash_dos_vuln_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_oracle_java_se_murmurhash_dos_vuln_win.nasl?root=openvas&view=markup
Oracle Java SE 'MurmurHash' Algorithm Hash Collision DoS Vulnerability
(Windows)

r14713 803119 gb_google_chrome_mult_vuln01_dec12_lin.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln01_dec12_lin.nasl?root=openvas&view=markup
Google Chrome Multiple Vulnerabilities-01 Dec2012 (Linux)

r14713 803117 gb_ourwebftp_mult_xss_vuln.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_ourwebftp_mult_xss_vuln.nasl?root=openvas&view=markup
OurWebFTP Multiple Cross Site Scripting Vulnerabilities

r14713 803122 gb_google_chrome_mult_vuln02_dec12_lin.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln02_dec12_lin.nasl?root=openvas&view=markup
Google Chrome Multiple Vulnerabilities-02 Dec2012 (Linux)

r14713 802681 gb_oracle_java_se_hash_collision_dos_vuln_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_oracle_java_se_hash_collision_dos_vuln_win.nasl?root=openvas&view=markup
Oracle Java SE Hash Collision DoS Vulnerability (Windows)

r14713 802045 gb_linux_rootkit_nginx_iframe_injection.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_linux_rootkit_nginx_iframe_injection.nasl?root=openvas&view=markup
64-bit Debian Linux Rootkit with nginx Doing iFrame Injection

r14713 803120 gb_google_chrome_mult_vuln01_dec12_macosx.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_google_chrome_mult_vuln01_dec12_macosx.nasl?root=openvas&view=markup
Google Chrome Multiple Vulnerabilities-01 Dec2012 (Mac OS X)

r14717 72626 deb_2579_1.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/deb_2579_1.nasl?root=openvas&view=markup
Debian Security Advisory DSA 2579-1 (apache2)

r14717 72630 freebsd_chromium23.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/freebsd_chromium23.nasl?root=openvas&view=markup
FreeBSD Ports: chromium

r14717 72632 freebsd_chromium24.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/freebsd_chromium24.nasl?root=openvas&view=markup
FreeBSD Ports: chromium

r14717 72631 freebsd_yahoo-ui0.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/freebsd_yahoo-ui0.nasl?root=openvas&view=markup
FreeBSD Ports: yahoo-ui

r14717 72628 deb_2580_1.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/deb_2580_1.nasl?root=openvas&view=markup
Debian Security Advisory DSA 2580-1 (libxml2)

r14717 72629 freebsd_bogofilter3.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/freebsd_bogofilter3.nasl?root=openvas&view=markup
FreeBSD Ports: bogofilter

r14717 72627 deb_2577_1.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/deb_2577_1.nasl?root=openvas&view=markup
Debian Security Advisory DSA 2577-1 (libssh)

r14717 72625 deb_2578_1.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/deb_2578_1.nasl?root=openvas&view=markup
Debian Security Advisory DSA 2578-1 (rssh)

== Metasploit modules (3) ==

r16150 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/http/ektron_xslt_exec.rb
Ektron 8.02 XSLT Transform Remote Code Execution

r16152 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/smb/psexec_loggedin_users.rb
Microsoft Windows Authenticated Logged In Users Enumeration

r16153 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/multi/misc/indesign_server_soap.rb
Adobe IndesignServer 5.5 SOAP Server Arbitrary Script Execution

== Nessus plugins (9) ==

63154 ubuntu_USN-1653-1.nasl
http://nessus.org/plugins/index.php?view=single&id=63154
USN-1653-1 : linux-ec2 vulnerability

63153 suse_xen-8379.nasl
http://nessus.org/plugins/index.php?view=single&id=63153
SuSE 10 Security Update : Xen (ZYPP Patch Number 8379)

63152 redhat-RHSA-2012-1540.nasl
http://nessus.org/plugins/index.php?view=single&id=63152
RHSA-2012-1540: kernel

63151 debian_DSA-2581.nasl
http://nessus.org/plugins/index.php?view=single&id=63151
Debian DSA-2581-1 : mysql-5.1 - several vulnerabilities

63150 mariadb_5_5_28a.nasl
http://nessus.org/plugins/index.php?view=single&id=63150
MariaDB 5.5 < 5.5.28a Buffer Overflow

63149 mariadb_5_3_11.nasl
http://nessus.org/plugins/index.php?view=single&id=63149
MariaDB 5.3 < 5.3.11 Buffer Overflow

63148 mariadb_5_2_13.nasl
http://nessus.org/plugins/index.php?view=single&id=63148
MariaDB 5.2 < 5.2.13 Buffer Overflow

63147 mariadb_5_1_66.nasl
http://nessus.org/plugins/index.php?view=single&id=63147
MariaDB 5.1 < 5.1.66 Buffer Overflow

arcserve_backup_cve-2012-2971.nbin
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: