Nmap Development mailing list archives

New VA Modules: Nessus: 12


From: New VA Module Alert Service <postmaster () insecure org>
Date: Tue, 29 Oct 2013 10:00:16 +0000 (UTC)

This report describes any new scripts/modules/exploits added to Nmap,
Metasploit, Nessus, and OpenVAS since yesterday.

== Nessus plugins (12) ==

70663 puppet_enterprise_301.nasl
http://nessus.org/plugins/index.php?view=single&id=70663
Puppet Enterprise < 3.0.1 Multiple Vulnerabilities

70662 puppet_cve_2013-3567.nasl
http://nessus.org/plugins/index.php?view=single&id=70662
Puppet Unauthenticated Remote Code Execution

70661 puppet_2_7_23.nasl
http://nessus.org/plugins/index.php?view=single&id=70661
Puppet Multiple Vulnerabilities (CVE-2013-4761, CVE-2013-4956)

70660 xerox_xrx13-008_colorqube.nasl
http://nessus.org/plugins/index.php?view=single&id=70660
Xerox ColorQube Unspecified Remote Protocol Authorization Bypass
(XRX13-008)

70659 xerox_xrx13-008.nasl
http://nessus.org/plugins/index.php?view=single&id=70659
Xerox WorkCentre Unspecified Remote Protocol Authorization Bypass
(XRX13-008)

70658 ssh_cbc_supported_ciphers.nasl
http://nessus.org/plugins/index.php?view=single&id=70658
SSH Server CBC Mode Ciphers Enabled

70657 ssh_supported_algorithms.nasl
http://nessus.org/plugins/index.php?view=single&id=70657
SSH Algorithms and Languages Supported

70656 coreftp_2_2_1785.nasl
http://nessus.org/plugins/index.php?view=single&id=70656
Core FTP < 2.2 build 1785 CWD Command Buffer Overflow

70655 fedora_2013-19354.nasl
http://nessus.org/plugins/index.php?view=single&id=70655
Fedora 18 : salt-0.17.1-1.fc18 (2013-19354)

70654 fedora_2013-19271.nasl
http://nessus.org/plugins/index.php?view=single&id=70654
Fedora 18 : scipy-0.12.1-1.fc18 (2013-19271)

70653 fedora_2013-19236.nasl
http://nessus.org/plugins/index.php?view=single&id=70653
Fedora 19 : scipy-0.12.1-1.fc19 (2013-19236)

70652 debian_DSA-2787.nasl
http://nessus.org/plugins/index.php?view=single&id=70652
Debian DSA-2787-1 : roundcube - design error
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: