Nmap Development mailing list archives

New VA Modules: OpenVAS: 8, MSF: 2


From: New VA Module Alert Service <postmaster () insecure org>
Date: Tue, 9 Oct 2012 10:02:53 -0700 (PDT)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== OpenVAS plugins (8) ==

r14222 864767 gb_fedora_2012_15098_openstack-swift_fc16.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_fedora_2012_15098_openstack-swift_fc16.nasl?root=openvas&view=markup
Fedora Update for openstack-swift FEDORA-2012-15098

r14222 864766 gb_fedora_2012_14344_phpldapadmin_fc17.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_fedora_2012_14344_phpldapadmin_fc17.nasl?root=openvas&view=markup
Fedora Update for phpldapadmin FEDORA-2012-14344

r14222 864768 gb_fedora_2012_14363_phpldapadmin_fc16.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_fedora_2012_14363_phpldapadmin_fc16.nasl?root=openvas&view=markup
Fedora Update for phpldapadmin FEDORA-2012-14363

r14222 831743 gb_mandriva_MDVSA_2012_150_1.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2012_150_1.nasl?root=openvas&view=markup
Mandriva Update for java-1.6.0-openjdk MDVSA-2012:150-1
(java-1.6.0-openjdk)

r14222 831744 gb_mandriva_MDVSA_2012_151_1.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2012_151_1.nasl?root=openvas&view=markup
Mandriva Update for ghostscript MDVSA-2012:151-1 (ghostscript)

r14222 831741 gb_mandriva_MDVSA_2012_160.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2012_160.nasl?root=openvas&view=markup
Mandriva Update for imagemagick MDVSA-2012:160 (imagemagick)

r14222 831742 gb_mandriva_MDVSA_2012_161.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_mandriva_MDVSA_2012_161.nasl?root=openvas&view=markup
Mandriva Update for html2ps MDVSA-2012:161 (html2ps)

r14223 gb_phptax_55759.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_phptax_55759.nasl?root=openvas&view=markup
PhpTax 'drawimage.php' Remote Arbitrary Command Execution Vulnerability

== Metasploit modules (2) ==

r15941 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/http/avaya_ccr_imageupload_exec.rb
Avaya IP Office Customer Call Reporter ImageUpload.ashx Remote Command
Execution

r15944 http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/multi/http/phptax_exec.rb
PhpTax pfilez Parameter Exec Remote Code Injection
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: