Nmap Development mailing list archives

New VA Modules: NSE: 1, MSF: 2, Nessus: 35, OpenVAS: 4


From: New VA Module Alert Service <postmaster () insecure org>
Date: Fri, 9 Aug 2013 10:00:38 +0000 (UTC)

This report describes any new scripts/modules/exploits added to Nmap,
Metasploit, Nessus, and OpenVAS since yesterday.

== Nmap Scripting Engine scripts (1) ==

r31705 qconn-exec http://nmap.org/nsedoc/scripts/qconn-exec.html
https://svn.nmap.org/nmap/scripts/qconn-exec.nse
Author: Brendan Coles
Attempts to identify whether a listening QNX QCONN daemon allows
unauthenticated users to execute arbitrary operating system commands.

== Metasploit modules (2) ==

6b514bb4 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/linux/http/dlink_dir300_exec_telnet.rb
D-Link Devices Unauthenticated Remote Command Execution

d1beb313 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/mozilla_firefox_onreadystatechange.rb
Firefox onreadystatechange Event DocumentViewerImpl Use After Free

== Nessus plugins (35) ==

69276 samba_4_0_8.nasl
http://nessus.org/plugins/index.php?view=single&id=69276
Samba 3.x < 3.5.22 / 3.6.x < 3.6.17 / 4.0.x < 4.0.8 read_nttrans_ea_lis
DoS

69275 webex_oneclick_password_disclosure.nasl
http://nessus.org/plugins/index.php?view=single&id=69275
Cisco WebEx One-Click Password Disclosure

69274 webex_oneclick_installed.nasl
http://nessus.org/plugins/index.php?view=single&id=69274
Cisco WebEx One-Click Detection

69273 joomla_2514.nasl
http://nessus.org/plugins/index.php?view=single&id=69273
Joomla! 2.5.x < 2.5.14 / 3.x < 3.1.5 File Upload Arbitrary Code
Execution

69272 seamonkey_220.nasl
http://nessus.org/plugins/index.php?view=single&id=69272
SeaMonkey < 2.20 Multiple Vulnerabilities

69271 mozilla_thunderbird_1708_esr.nasl
http://nessus.org/plugins/index.php?view=single&id=69271
Mozilla Thunderbird ESR 17.x < 17.0.8 Multiple Vulnerabilities

69270 mozilla_thunderbird_1708.nasl
http://nessus.org/plugins/index.php?view=single&id=69270
Mozilla Thunderbird < 17.0.8 Multiple Vulnerabilities

69269 mozilla_firefox_23.nasl
http://nessus.org/plugins/index.php?view=single&id=69269
Firefox < 23.0 Multiple Vulnerabilities

69268 mozilla_firefox_1708_esr.nasl
http://nessus.org/plugins/index.php?view=single&id=69268
Firefox ESR 17.x < 17.0.8 Multiple Vulnerabilities

69267 macosx_thunderbird_17_0_8_esr.nasl
http://nessus.org/plugins/index.php?view=single&id=69267
Thunderbird ESR 17.x < 17.0.8 Multiple Vulnerabilities (Mac OS X)

69266 macosx_thunderbird_17_0_8.nasl
http://nessus.org/plugins/index.php?view=single&id=69266
Thunderbird < 17.0.8 Multiple Vulnerabilities (Mac OS X)

69265 macosx_firefox_23.nasl
http://nessus.org/plugins/index.php?view=single&id=69265
Firefox < 23.0 Multiple Vulnerabilities (Mac OS X)

69264 macosx_firefox_17_0_8_esr.nasl
http://nessus.org/plugins/index.php?view=single&id=69264
Firefox ESR 17.x < 17.0.8 Multiple Vulnerabilities (Mac OS X)

69263 symantec_backup_exec_server_sym13-009.nasl
http://nessus.org/plugins/index.php?view=single&id=69263
Symantec Backup Exec Server Multiple Vulnerabilities (SYM13-009)

69262 symantec_backup_exec_ralus_sym13-009.nasl
http://nessus.org/plugins/index.php?view=single&id=69262
Symantec Backup Exec RALUS Code Execution (SYM13-009)

69261 symantec_backup_exec_ralus_installed.nasl
http://nessus.org/plugins/index.php?view=single&id=69261
Symantec Backup Exec Remote Agent for Linux and UNIX Servers (RALUS)
Installed

69260 ubuntu_USN-1925-1.nasl
http://nessus.org/plugins/index.php?view=single&id=69260
Ubuntu 12.04 LTS / 12.10 / 13.04 : thunderbird vulnerabilities
(USN-1925-1)

69259 suse_11_bind-130805.nasl
http://nessus.org/plugins/index.php?view=single&id=69259
SuSE 11.2 / 11.3 Security Update : bind (SAT Patch Numbers 8160 / 8161)

69258 sl_20130807_thunderbird_on_SL5_x.nasl
http://nessus.org/plugins/index.php?view=single&id=69258
Scientific Linux Security Update : thunderbird on SL5.x, SL6.x
i386/x86_64

69257 sl_20130807_firefox_on_SL5_x.nasl
http://nessus.org/plugins/index.php?view=single&id=69257
Scientific Linux Security Update : firefox on SL5.x, SL6.x i386/x86_64

69256 redhat-RHSA-2013-1144.nasl
http://nessus.org/plugins/index.php?view=single&id=69256
RHEL 6 : nss, nss-util, nss-softokn, and nspr (RHSA-2013-1144)

69255 redhat-RHSA-2013-1142.nasl
http://nessus.org/plugins/index.php?view=single&id=69255
RHEL 5 / 6 : thunderbird (RHSA-2013-1142)

69254 redhat-RHSA-2013-1140.nasl
http://nessus.org/plugins/index.php?view=single&id=69254
RHEL 5 / 6 : firefox (RHSA-2013-1140)

69253 oraclelinux_ELSA-2013-1144.nasl
http://nessus.org/plugins/index.php?view=single&id=69253
Oracle Linux 6 : nspr / nss / nss-softokn / nss-util (ELSA-2013-1144)

69252 oraclelinux_ELSA-2013-1142.nasl
http://nessus.org/plugins/index.php?view=single&id=69252
Oracle Linux 6 : thunderbird (ELSA-2013-1142)

69251 oraclelinux_ELSA-2013-1140.nasl
http://nessus.org/plugins/index.php?view=single&id=69251
Oracle Linux 5 / 6 : firefox (ELSA-2013-1140)

69250 freebsd_pkg_4b448a96ff7311e2b28d080027ef73ec.nasl
http://nessus.org/plugins/index.php?view=single&id=69250
FreeBSD : PuTTY -- Four security holes in versions before 0.63
(4b448a96-ff73-11e2-b28d-080027ef73ec)

69249 fedora_2013-13911.nasl
http://nessus.org/plugins/index.php?view=single&id=69249
Fedora 18 : ReviewBoard-1.7.12-1.fc18 / python-djblets-0.7.16-1.fc18
(2013-13911)

69248 fedora_2013-13850.nasl
http://nessus.org/plugins/index.php?view=single&id=69248
Fedora 19 : ReviewBoard-1.7.12-1.fc19 / python-djblets-0.7.16-1.fc19
(2013-13850)

69247 centos_RHSA-2013-1144.nasl
http://nessus.org/plugins/index.php?view=single&id=69247
CentOS 6 : nss / nss-util / nss-softokn / nspr (CESA-2013:1144)

69246 centos_RHSA-2013-1142.nasl
http://nessus.org/plugins/index.php?view=single&id=69246
CentOS 5 : thunderbird (CESA-2013:1142)

69245 centos_RHSA-2013-1140.nasl
http://nessus.org/plugins/index.php?view=single&id=69245
CentOS 5 / 6 : firefox (CESA-2013:1140)

69244 Slackware_SSA_2013-219-03.nasl
http://nessus.org/plugins/index.php?view=single&id=69244
Slackware 14.0 / current : seamonkey (SSA:2013-219-03)

69243 Slackware_SSA_2013-219-02.nasl
http://nessus.org/plugins/index.php?view=single&id=69243
Slackware 13.37 / 14.0 / current : mozilla-thunderbird (SSA:2013-219-02)

69242 Slackware_SSA_2013-219-01.nasl
http://nessus.org/plugins/index.php?view=single&id=69242
Slackware 13.37 / 14.0 / current : mozilla-firefox (SSA:2013-219-01)

== OpenVAS plugins (4) ==

r17385 2013/gb_sybase_easerver_61358.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_sybase_easerver_61358.nasl?root=openvas&view=markup
Sybase EAServer Multiple Security Vulnerabilities

r17385 2013/gb_trustport_61662.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_trustport_61662.nasl?root=openvas&view=markup
TrustPort WebFilter 'help.php' Arbitrary File Access Vulnerability

r17391 2013/gb_seagate_nas_default_admin.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_seagate_nas_default_admin.nasl?root=openvas&view=markup
Seagate NAS Default Login

r17391 gb_seagate_blackarmor_nas_detect.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_seagate_blackarmor_nas_detect.nasl?root=openvas&view=markup
Seagate Blackarmor NAS Detection
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: