Nmap Development mailing list archives

New VA Modules: MSF: 1, Nessus: 20, OpenVAS: 2


From: New VA Module Alert Service <postmaster () insecure org>
Date: Wed, 9 Oct 2013 10:00:26 +0000 (UTC)

This report describes any new scripts/modules/exploits added to Nmap,
Metasploit, Nessus, and OpenVAS since yesterday.

== Metasploit modules (1) ==

ec6516d8 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/linux/http/linksys_wrt110_cmd_exec.rb
Linksys WRT110 Remote Command Execution

== Nessus plugins (20) ==

70343 adobe_reader_apsb13-25.nasl
http://nessus.org/plugins/index.php?view=single&id=70343
Adobe Reader 11.0.4 Crafted PDF File Handling JavaScript Scheme URI
Execution (APSB13-25)

70342 adobe_acrobat_apsb13-25.nasl
http://nessus.org/plugins/index.php?view=single&id=70342
Adobe Acrobat 11.0.4 Crafted PDF File Handling JavaScript Scheme URI
Execution (APSB13-25)

70341 macosx_ms13-087.nasl
http://nessus.org/plugins/index.php?view=single&id=70341
MS13-087: Vulnerability in Silverlight Could Allow Information
Disclosure (2890788) (Mac OS X)

70340 macosx_ms13-085.nasl
http://nessus.org/plugins/index.php?view=single&id=70340
MS13-085: Vulnerabilities in Microsoft Excel Could Allow Remote Code
Execution (2885080) (Mac OS X)

70339 smb_nt_ms13-087.nasl
http://nessus.org/plugins/index.php?view=single&id=70339
MS13-087: Vulnerability in Silverlight Could Allow Information
Disclosure (2890788)

70338 smb_nt_ms13-086.nasl
http://nessus.org/plugins/index.php?view=single&id=70338
MS13-086: Vulnerabilities in Microsoft Word Could Allow Remote Code
Execution (2885084)

70337 smb_nt_ms13-085.nasl
http://nessus.org/plugins/index.php?view=single&id=70337
MS13-085: Vulnerabilities in Microsoft Excel Could Allow Remote Code
Execution (2885080)

70336 smb_nt_ms13-084.nasl
http://nessus.org/plugins/index.php?view=single&id=70336
MS13-084: Vulnerabilities in Microsoft SharePoint Server Could Allow
Remote Code Execution (2885089)

70335 smb_nt_ms13-083.nasl
http://nessus.org/plugins/index.php?view=single&id=70335
MS13-083: Vulnerability in Windows Common Control Library Could Allow
Remote Code Execution (2864058)

70334 smb_nt_ms13-082.nasl
http://nessus.org/plugins/index.php?view=single&id=70334
MS13-082: Vulnerabilities in .NET Framework Could Allow Remote Code
Execution (2878890)

70333 smb_nt_ms13-081.nasl
http://nessus.org/plugins/index.php?view=single&id=70333
MS13-081: Vulnerabilities in Windows Kernel-Mode Drivers Could Allow
Remote Code Execution (2870008)

70332 smb_nt_ms13-080.nasl
http://nessus.org/plugins/index.php?view=single&id=70332
MS13-080: Cumulative Security Update for Internet Explorer (2879017)

70328 suse_11_libmysql55client18-130926.nasl
http://nessus.org/plugins/index.php?view=single&id=70328
SuSE 11.3 Security Update : mysql, mysql-client (SAT Patch Number 8364)

70327 redhat-RHSA-2013-1409.nasl
http://nessus.org/plugins/index.php?view=single&id=70327
RHEL 5 / 6 : xinetd (RHSA-2013-1409)

70326 oraclelinux_ELSA-2013-1409.nasl
http://nessus.org/plugins/index.php?view=single&id=70326
Oracle Linux 5 / 6 : xinetd (ELSA-2013-1409)

70325 mandriva_MDVSA-2013-246.nasl
http://nessus.org/plugins/index.php?view=single&id=70325
Mandriva Linux Security Advisory : openjpa (MDVSA-2013:246)

70324 gentoo_GLSA-201310-06.nasl
http://nessus.org/plugins/index.php?view=single&id=70324
GLSA-201310-06 : Aircrack-ng: User-assisted execution of arbitrary code

windows_process_information.nbin

windows_process_information_unique_name.nbin

windows_process_module_information.nbin

== OpenVAS plugins (2) ==

r17975 2013/gb_measuresoft_scadapro_svr_dll_code_exe_vuln.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_measuresoft_scadapro_svr_dll_code_exe_vuln.nasl?root=openvas&view=markup
Measuresoft ScadaPro Server DLL Code Execution Vulnerability

r17975 gb_measuresoft_scadapro_server_detect.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_measuresoft_scadapro_server_detect.nasl?root=openvas&view=markup
Measuresoft ScadaPro Server Detection
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: