Nmap Development mailing list archives

New VA Modules: MSF: 6, Nessus: 9, OpenVAS: 2


From: New VA Module Alert Service <postmaster () insecure org>
Date: Fri, 30 Aug 2013 10:00:36 +0000 (UTC)

This report describes any new scripts/modules/exploits added to Nmap,
Metasploit, Nessus, and OpenVAS since yesterday.

== Metasploit modules (6) ==

4d120f49 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/linux/http/spip_connect_exec.rb
SPIP Connect Parameter Injection

5692cde5 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/gather/prefetch_gather.rb
Windows Gather Prefetch File Information

1f27a2b7 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/gather/prefetch_tool.rb
Windows Gather Prefetch File Information

6539b4e5 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/gather/enum_prefetch.rb
Windows Gather Prefetch File Information

bc44d428 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/unix/webapp/spip_connect_exec.rb
SPIP Connect Parameter Injection

64d21c72 https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/manage/portproxy.rb
Windows Manage PortProxy Interface

== Nessus plugins (9) ==

69504 sl_20130828_389_ds_base_on_SL6_x.nasl
http://nessus.org/plugins/index.php?view=single&id=69504
Scientific Linux Security Update : 389-ds-base on SL6.x i386/x86_64

69503 sl_20130827_kernel_on_SL6_x.nasl
http://nessus.org/plugins/index.php?view=single&id=69503
Scientific Linux Security Update : kernel on SL6.x i386/x86_64

69502 redhat-RHSA-2013-1182.nasl
http://nessus.org/plugins/index.php?view=single&id=69502
RHEL 6 : 389-ds-base (RHSA-2013-1182)

69501 oraclelinux_ELSA-2013-1182.nasl
http://nessus.org/plugins/index.php?view=single&id=69501
Oracle Linux 6 : 389-ds-base (ELSA-2013-1182)

69500 gentoo_GLSA-201308-05.nasl
http://nessus.org/plugins/index.php?view=single&id=69500
GLSA-201308-05 : Wireshark: Multiple vulnerabilities

69499 freebsd_pkg_fd2bf3b5100111e3ba940025905a4771.nasl
http://nessus.org/plugins/index.php?view=single&id=69499
FreeBSD : asterisk -- multiple vulnerabilities
(fd2bf3b5-1001-11e3-ba94-0025905a4771)

69498 fedora_2013-15221.nasl
http://nessus.org/plugins/index.php?view=single&id=69498
Fedora 19 : roundcubemail-0.9.3-2.fc19 (2013-15221)

69497 centos_RHSA-2013-1182.nasl
http://nessus.org/plugins/index.php?view=single&id=69497
CentOS 6 : 389-ds-base (CESA-2013:1182)

69496 centos_RHSA-2013-1173.nasl
http://nessus.org/plugins/index.php?view=single&id=69496
CentOS 6 : kernel (CESA-2013:1173)

== OpenVAS plugins (2) ==

r17525 gb_spip_detect.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_spip_detect.nasl?root=openvas&view=markup
SPIP Detection

r17525 2013/gb_spip_54292.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_spip_54292.nasl?root=openvas&view=markup
SPIP 'connect' Parameter PHP Code Injection Vulnerability
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: