Nmap Development mailing list archives

New VA Modules: MSF: 2, Nessus: 10, OpenVAS: 10


From: New VA Module Alert Service <postmaster () insecure org>
Date: Tue, 12 Aug 2014 10:00:49 +0000 (UTC)

This report describes any new scripts/modules/exploits added to Nmap,
Metasploit, Nessus, and OpenVAS since yesterday.

== Metasploit modules (2) ==

65ada24d 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/payloads/stagers/android/reverse_http.rb
Dalvik Reverse HTTP Stager

65ada24d 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/payloads/stagers/android/reverse_https.rb
Dalvik Reverse HTTPS Stager

== Nessus plugins (10) ==

77120 ibm_tsm_server_6_3_4_200.nasl
http://nessus.org/plugins/index.php?view=single&id=77120
IBM Tivoli Storage Manager Server 6.3.x < 6.3.4.200 Information
Disclosure

77119 ibm_tsm_server_6_3_4_0.nasl
http://nessus.org/plugins/index.php?view=single&id=77119
IBM Tivoli Storage Manager Server 6.3.x < 6.3.4.0 DoS

77118 ibm_tsm_server_6_2_6_0.nasl
http://nessus.org/plugins/index.php?view=single&id=77118
IBM Tivoli Storage Manager Server 6.2.x < 6.2.6.0 Multiple
Vulnerabilities

77117 ibm_tsm_server_6_1_x.nasl
http://nessus.org/plugins/index.php?view=single&id=77117
IBM Tivoli Storage Manager Server 6.1.x Multiple Vulnerabilities

77116 ibm_tsm_server_5_5_x.nasl
http://nessus.org/plugins/index.php?view=single&id=77116
IBM Tivoli Storage Manager Server 5.5.x Multiple Vulnerabilities

77115 halon_sr_3_2_r2.nasl
http://nessus.org/plugins/index.php?view=single&id=77115
Halon Security Router < 3.2r2 Multiple Vulnerabilities

77114 halon_sr_default_creds.nasl
http://nessus.org/plugins/index.php?view=single&id=77114
Halon Security Router User Interface Default Credentials

77112 gentoo_GLSA-201408-03.nasl
http://nessus.org/plugins/index.php?view=single&id=77112
GLSA-201408-03 : LibSSH: Information disclosure

77111 debian_DSA-3002.nasl
http://nessus.org/plugins/index.php?view=single&id=77111
Debian DSA-3002-1 : wireshark - security update

halon_sr_detect.nbin

== OpenVAS plugins (10) ==

r609 703000 2014/deb_3000.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_3000.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 3000-1 (krb5 - security update

r609 703001 2014/deb_3001.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_3001.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 3001-1 (wordpress - security update

r609 703002 2014/deb_3002.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_3002.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 3002-1 (wireshark - security update

r609 703003 2014/deb_3003.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_3003.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 3003-1 (libav - security update

r609 703004 2014/deb_3004.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_3004.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 3004-1 (kde4libs - security update

r609 702995 2014/deb_2995.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2995.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2995-1 (lzo2 - security update

r609 702996 2014/deb_2996.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2996.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2996-1 (icedove - security update

r609 702997 2014/deb_2997.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2997.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2997-1 (reportbug - security update

r609 702998 2014/deb_2998.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2998.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2998-1 (openssl - security update

r609 702999 2014/deb_2999.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2999.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2999-1 (drupal7 - security update
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: