Nmap Development mailing list archives
New VA Modules: MSF: 1, Nessus: 3, OpenVAS: 2
From: New VA Module Alert Service <postmaster () insecure org>
Date: Tue, 27 Aug 2013 10:00:36 +0000 (UTC)
This report describes any new scripts/modules/exploits added to Nmap, Metasploit, Nessus, and OpenVAS since yesterday. == Metasploit modules (1) == b72566b8 https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/http/oracle_endeca_exec.rb Oracle Endeca Server Remote Command Execution == Nessus plugins (3) == 69472 realplayer_16_0_3_51.nasl http://nessus.org/plugins/index.php?view=single&id=69472 RealPlayer for Windows < 16.0.3.51 Multiple Vulnerabilities 69471 eas_default_key.nasl http://nessus.org/plugins/index.php?view=single&id=69471 Multiple Vendors EAS Authentication Bypass 69470 debian_DSA-2741.nasl http://nessus.org/plugins/index.php?view=single&id=69470 Debian DSA-2741-1 : chromium-browser - several vulnerabilities == OpenVAS plugins (2) == r17483 903318 2013/secpod_adobe_air_code_exec_n_dos_vuln_macosx.nasl http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/secpod_adobe_air_code_exec_n_dos_vuln_macosx.nasl?root=openvas&view=markup Adobe Air Code Execution and DoS Vulnerabilities (MAC OS X) r17483 903319 2013/secpod_adobe_air_code_exec_n_dos_vuln_win.nasl http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/secpod_adobe_air_code_exec_n_dos_vuln_win.nasl?root=openvas&view=markup Adobe Air Code Execution and DoS Vulnerabilities (Windows) _______________________________________________ Sent through the dev mailing list http://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- New VA Modules: MSF: 1, Nessus: 3, OpenVAS: 2 New VA Module Alert Service (Aug 27)