Nmap Development mailing list archives

New VA Modules: MSF: 1, Nessus: 3, OpenVAS: 2


From: New VA Module Alert Service <postmaster () insecure org>
Date: Tue, 27 Aug 2013 10:00:36 +0000 (UTC)

This report describes any new scripts/modules/exploits added to Nmap,
Metasploit, Nessus, and OpenVAS since yesterday.

== Metasploit modules (1) ==

b72566b8 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/http/oracle_endeca_exec.rb
Oracle Endeca Server Remote Command Execution

== Nessus plugins (3) ==

69472 realplayer_16_0_3_51.nasl
http://nessus.org/plugins/index.php?view=single&id=69472
RealPlayer for Windows < 16.0.3.51 Multiple Vulnerabilities

69471 eas_default_key.nasl
http://nessus.org/plugins/index.php?view=single&id=69471
Multiple Vendors EAS Authentication Bypass

69470 debian_DSA-2741.nasl
http://nessus.org/plugins/index.php?view=single&id=69470
Debian DSA-2741-1 : chromium-browser - several vulnerabilities

== OpenVAS plugins (2) ==

r17483 903318 2013/secpod_adobe_air_code_exec_n_dos_vuln_macosx.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/secpod_adobe_air_code_exec_n_dos_vuln_macosx.nasl?root=openvas&view=markup
Adobe Air Code Execution and DoS Vulnerabilities (MAC OS X)

r17483 903319 2013/secpod_adobe_air_code_exec_n_dos_vuln_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/secpod_adobe_air_code_exec_n_dos_vuln_win.nasl?root=openvas&view=markup
Adobe Air Code Execution and DoS Vulnerabilities (Windows)
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: