Nmap Development mailing list archives

New VA Modules: OpenVAS: 6, MSF: 2, Nessus: 6


From: New VA Module Alert Service <postmaster () insecure org>
Date: Tue, 5 Oct 2010 10:00:53 -0700 (PDT)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== OpenVAS plugins (6) ==

r9145 801456 gb_ms_win_pgc_insecure_lib_load_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_ms_win_pgc_insecure_lib_load_vuln.nasl?root=openvas&view=markup
Microsoft Windows Progman Group Converter Insecure Library Loading
Vulnerability

r9145 902316 secpod_netautor_professional_xss_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_netautor_professional_xss_vuln.nasl?root=openvas&view=markup
Netautor Professional 'login2.php' Cross Site Scripting Vulnerability

r9145 801518 gb_netartmedia_websiteadmin_dir_traversal_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_netartmedia_websiteadmin_dir_traversal_vuln.nasl?root=openvas&view=markup
NetArtMedia WebSiteAdmin Directory Traversal Vulnerability

r9145 801454 gb_netart_media_car_portal_mult_xss_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_netart_media_car_portal_mult_xss_vuln.nasl?root=openvas&view=markup
NetArt Media Car Portal Multiple Cross-site Scripting Vulnerabilities

r9148 100841 gb_dnet_43708.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_dnet_43708.nasl?root=openvas&view=markup
DNET Live-Stats 'team.rc5-72.php' Local File Include Vulnerability

r9148 100842 gb_surgemail_43679.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_surgemail_43679.nasl?root=openvas&view=markup
SurgeMail SurgeWeb Cross Site Scripting Vulnerability

== Metasploit modules (2) ==

r10547 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/brightstor/message_engine_72.rb
CA BrightStor ARCserve Message Engine 0x72 Buffer Overflow

r10547 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/brightstor/tape_engine_8A.rb
CA BrightStor ARCserve Tape Engine 0x8A Buffer Overflow

== Nessus plugins (6) ==

49708 zencart_typefilter_read_files.nasl
http://nessus.org/plugins/index.php?view=single&id=49708
Zen Cart index.php typefilter Parameter Traversal Local File Inclusion

49707 trendmicro_ufproxybrowserctrl_activex_exec.nasl
http://nessus.org/plugins/index.php?view=single&id=49707
Trend Micro Internet Security Pro UfProxyBrowserCtrl ActiveX extSetOwner
Function Arbitrary Code Execution

49706 tikiwiki_type_xss.nasl
http://nessus.org/plugins/index.php?view=single&id=49706
Tiki Wiki 'tiki-edit_wiki_section.php' type Parameter XSS

49705 webmirror_mailto.nasl
http://nessus.org/plugins/index.php?view=single&id=49705
Gathered e-mail Addresses

49704 webmirror_ext_URL.nasl
http://nessus.org/plugins/index.php?view=single&id=49704
External URLs

torture_cgi_pers_XSS_RE.inc
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: