Nmap Development mailing list archives

New VA Modules: Nessus: 12, OpenVAS: 1


From: New VA Module Alert Service <postmaster () insecure org>
Date: Wed, 8 Oct 2014 10:00:20 +0000 (UTC)

This report describes any new scripts/modules/exploits added to Nmap,
Metasploit, Nessus, and OpenVAS since yesterday.

== Nessus plugins (12) ==

78081 macosx_google_chrome_38_0_2125_101.nasl
http://nessus.org/plugins/index.php?view=single&id=78081
Google Chrome < 38.0.2125.101 Multiple Vulnerabilities (Mac OS X)

78080 google_chrome_38_0_2125_101.nasl
http://nessus.org/plugins/index.php?view=single&id=78080
Google Chrome < 38.0.2125.101 Multiple Vulnerabilities

78079 hp_systems_insight_manager_74_multiple_vulns.nasl
http://nessus.org/plugins/index.php?view=single&id=78079
HP Systems Insight Manager < 7.4 Multiple Vulnerabilities

78078 winscp_5_5_5.nasl
http://nessus.org/plugins/index.php?view=single&id=78078
WinSCP 5.x < 5.5.5 Multiple Vulnerabilities

78077 oracle_apex_listener_july_2012_cpu.nasl
http://nessus.org/plugins/index.php?view=single&id=78077
Oracle Application Express Listener Remote Information Disclosure
Vulnerability (July 2012 CPU)

78073 redhat-RHSA-2014-1359.nasl
http://nessus.org/plugins/index.php?view=single&id=78073
RHEL 7 : polkit-qt (RHSA-2014:1359)

78072 oraclelinux_ELSA-2014-1359.nasl
http://nessus.org/plugins/index.php?view=single&id=78072
Oracle Linux 7 : polkit-qt (ELSA-2014-1359)

78071 freebsd_pkg_b65873414d8811e4aef920cf30e32f6d.nasl
http://nessus.org/plugins/index.php?view=single&id=78071
FreeBSD : Bugzilla multiple security issues
(b6587341-4d88-11e4-aef9-20cf30e32f6d)

78070 centos_RHSA-2014-1359.nasl
http://nessus.org/plugins/index.php?view=single&id=78070
CentOS 7 : polkit-qt (CESA-2014:1359)

barracuda_web_filter_detect.nbin

oracle_apex_listener_detect.nbin

oracle_apex_listener_installed.nbin

== OpenVAS plugins (1) ==

r737 2014/gb_masscan.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/gb_masscan.nasl?root=openvas-nvts&view=markup
masscan (NASL wrapper)
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: