Nmap Development mailing list archives

New VA Modules: OpenVAS: 5, MSF: 1, Nessus: 16


From: New VA Module Alert Service <postmaster () insecure org>
Date: Wed, 2 Feb 2011 10:00:41 -0800 (PST)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== OpenVAS plugins (5) ==

r10140 103054 gb_postgresql_46084.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_postgresql_46084.nasl?root=openvas&view=markup
PostgreSQL 'intarray' Module 'gettoken()' Buffer Overflow Vulnerability

r10140 103055 gb_tinyWebGallery_46086.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_tinyWebGallery_46086.nasl?root=openvas&view=markup
TinyWebGallery Cross Site Scripting and Local File Include
Vulnerabilities

r10140 103053 gb_couchdb_46066.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_couchdb_46066.nasl?root=openvas&view=markup
Apache CouchDB Web Administration Interface Cross Site Scripting
Vulnerability

r10140 110001 remote-web-arachni.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/remote-web-arachni.nasl?root=openvas&view=markup
arachni (NASL wrapper)

r10140 103056 gb_moodle_46085.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_moodle_46085.nasl?root=openvas&view=markup
Moodle 'PHPCOVERAGE_HOME' Cross Site Scripting Vulnerability

== Metasploit modules (1) ==

r11692 http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/vlc_webm.rb
VideoLAN VLC MKV Memory Corruption

== Nessus plugins (16) ==

51848 ubuntu_USN-1055-1.nasl
http://nessus.org/plugins/index.php?view=single&id=51848
USN1055-1 : openjdk-6, openjdk-6b18 vulnerabilities

51847 ubuntu_USN-1054-1.nasl
http://nessus.org/plugins/index.php?view=single&id=51847
USN1054-1 : linux, linux-ec2 vulnerabilities

51846 ubuntu_USN-1053-1.nasl
http://nessus.org/plugins/index.php?view=single&id=51846
USN1053-1 : subversion vulnerabilities

51845 suse_pcsc-lite-7298.nasl
http://nessus.org/plugins/index.php?view=single&id=51845
SuSE Security Update: Security update for pcsc-lite (pcsc-lite-7298)

51844 suse_11_pcsc-ccid-110121.nasl
http://nessus.org/plugins/index.php?view=single&id=51844
SuSE Security Update: pcsc-ccid (2011-01-21)

51843 mandriva_MDVA-2011-003.nasl
http://nessus.org/plugins/index.php?view=single&id=51843
MDVA-2011:003: lsb-release

51842 fedora_2011-0862.nasl
http://nessus.org/plugins/index.php?view=single&id=51842
Fedora 14 2011-0862

51841 db2_95fp7.nasl
http://nessus.org/plugins/index.php?view=single&id=51841
DB2 9.5 < Fix Pack 7 Arbitrary Code Execution

51840 db2_9fp10.nasl
http://nessus.org/plugins/index.php?view=single&id=51840
DB2 9.1 < Fix Pack 10 Multiple Vulnerabilities

51839 microfocus_enterprise_admin_server_auth.nasl
http://nessus.org/plugins/index.php?view=single&id=51839
Micro Focus Enterprise Administration Server Authentication Check

51838 microfocus_enterprise_admin_server_detect.nasl
http://nessus.org/plugins/index.php?view=single&id=51838
Micro Focus Enterprise Administration Server Detection

51837 smb_kb2501696.nasl
http://nessus.org/plugins/index.php?view=single&id=51837
Vulnerability in MHTML Could Allow Information Disclosure (2501696)

51836 ms_sccm_detect.nasl
http://nessus.org/plugins/index.php?view=single&id=51836
Microsoft System Center Configuration Manager Detection

51835 ms_office_doc_conversions_launcher_detect.nasl
http://nessus.org/plugins/index.php?view=single&id=51835
Microsoft Office Document Conversions Launcher Detection

51834 ms_office_doc_load_balancer_detect.nasl
http://nessus.org/plugins/index.php?view=single&id=51834
Microsoft Office Document Conversions Load Balancer Detection

51833 zenworks_zfhipcnd_opcode2_overflow.nasl
http://nessus.org/plugins/index.php?view=single&id=51833
Novell ZENworks Handheld Management ZfHIPCND.exe Crafted TCP Request
Remote Overflow
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: