Nmap Development mailing list archives

New VA Modules: MSF: 1, Nessus: 8, OpenVAS: 3


From: New VA Module Alert Service <postmaster () insecure org>
Date: Wed, 29 Oct 2014 10:00:25 +0000 (UTC)

This report describes any new scripts/modules/exploits added to Nmap,
Metasploit, Nessus, and OpenVAS since yesterday.

== Metasploit modules (1) ==

e4064279 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/fileformat/ms14_060_sandworm.rb
MS14-060 Microsoft Windows OLE Package Manager Code Execution

== Nessus plugins (8) ==

78701 shellshock_mail_agents.nasl
http://nessus.org/plugins/index.php?view=single&id=78701
Mail Transfer Agent and Mail Delivery Agent Remote Command Execution via
Shellshock

78700 oracle_oaam_cpu_oct_2014.nasl
http://nessus.org/plugins/index.php?view=single&id=78700
Oracle Adaptive Access Manager Server Arbitrary Code Execution (October
2014 CPU)

78698 ubuntu_USN-2389-1.nasl
http://nessus.org/plugins/index.php?view=single&id=78698
Ubuntu 10.04 LTS / 12.04 LTS / 14.04 : libxml2 vulnerability
(USN-2389-1)

78697 f5_bigip_SOL15748.nasl
http://nessus.org/plugins/index.php?view=single&id=78697
F5 Networks BIG-IP : BIND vulnerability (SOL15748)

78696 f5_bigip_SOL15746.nasl
http://nessus.org/plugins/index.php?view=single&id=78696
F5 Networks BIG-IP : Linux kernel vulnerability (SOL15746)

78695 debian_DSA-3058.nasl
http://nessus.org/plugins/index.php?view=single&id=78695
Debian DSA-3058-1 : torque - security update

78694 debian_DSA-3057.nasl
http://nessus.org/plugins/index.php?view=single&id=78694
Debian DSA-3057-1 : libxml2 - security update

oracle_adaptive_access_manager_installed.nbin

== OpenVAS plugins (3) ==

r762 2014/gb_centreon_70648.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/gb_centreon_70648.nasl?root=openvas-nvts&view=markup
Centreon and Centreon Enterprise Server Multiple SQL Injection
Vulnerabilities

r762 2014/gb_svn_entries_http.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/gb_svn_entries_http.nasl?root=openvas-nvts&view=markup
Apache Subversion Module Metadata Accessible

r763 2014/gb_ipmi_default_pw.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/gb_ipmi_default_pw.nasl?root=openvas-nvts&view=markup
IPMI Default Password Vulnerability
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: