Nmap Development mailing list archives

New VA Modules: MSF: 6, Nessus: 19


From: New VA Module Alert Service <postmaster () insecure org>
Date: Wed, 4 Dec 2013 10:00:18 +0000 (UTC)

This report describes any new scripts/modules/exploits added to Nmap,
Metasploit, Nessus, and OpenVAS since yesterday.

== Metasploit modules (6) ==

049111cd https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/post/osx/manage/mount_share.rb
OSX

e157ff73 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/http/oracle_ilom_login.rb
Oracle ILO Manager Login Utility

aa628001 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/admin/http/zyxel_admin_password_extractor.rb
ZyXEL GS1510-16 Password Extractor

691d47f3 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/multi/http/cisco_dcnm_upload.rb
Cisco Prime Data Center Network Manager Arbitrary File Upload

045b848a 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/unix/webapp/php_wordpress_optimizepress.rb
WordPress OptimizePress Themes File Upload Vulnerability

c91d190d 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/http/cisco_asa_asdm.rb
Cisco ASA ASDM Bruteforce Login Utility

== Nessus plugins (19) ==

71177 domino_http_webadmin_mult_vulns.nasl
http://nessus.org/plugins/index.php?view=single&id=71177
IBM Domino Web Administrator Multiple Vulnerabilities

71176 microsoft_emet_4_0_4913_26122.nasl
http://nessus.org/plugins/index.php?view=single&id=71176
Microsoft EMET 3.x >= 3.5 / 4.x < 4.0.4913.26122 ASLR Security Bypass

71174 rompager_404_xss.nasl
http://nessus.org/plugins/index.php?view=single&id=71174
RomPager HTTP Referer Header XSS

71173 cisco-CSCuh81011-wlc.nasl
http://nessus.org/plugins/index.php?view=single&id=71173
HTTP DoS Vulnerability in Cisco Wireless LAN Controllers

71172 suse_11_nss-201311-131121.nasl
http://nessus.org/plugins/index.php?view=single&id=71172
SuSE 11.2 / 11.3 Security Update : mozilla-nspr, mozilla-nss (SAT Patch
Numbers 8572 / 8573)

71171 suse_11_java-1_6_0-openjdk-131129.nasl
http://nessus.org/plugins/index.php?view=single&id=71171
SuSE 11.2 Security Update : OpenJDK 1.6 (SAT Patch Number 8598)

71170 gentoo_GLSA-201312-04.nasl
http://nessus.org/plugins/index.php?view=single&id=71170
GLSA-201312-04 : libtheora: Arbitrary code execution

71169 gentoo_GLSA-201312-03.nasl
http://nessus.org/plugins/index.php?view=single&id=71169
GLSA-201312-03 : OpenSSL: Multiple Vulnerabilities

71168 gentoo_GLSA-201312-02.nasl
http://nessus.org/plugins/index.php?view=single&id=71168
GLSA-201312-02 : BusyBox: Multiple vulnerabilities

71167 gentoo_GLSA-201312-01.nasl
http://nessus.org/plugins/index.php?view=single&id=71167
GLSA-201312-01 : GNU C Library: Multiple vulnerabilities

71166 freebsd_pkg_d20732375b5211e380f7c86000cbc6ec.nasl
http://nessus.org/plugins/index.php?view=single&id=71166
FreeBSD : OpenTTD -- Denial of service using forcefully crashed
aircrafts (d2073237-5b52-11e3-80f7-c86000cbc6ec)

71165 aix_U855334.nasl
http://nessus.org/plugins/index.php?view=single&id=71165
AIX 6.1 TL 9 : bos.net.tcp.server (U855334)

71164 aix_U855283.nasl
http://nessus.org/plugins/index.php?view=single&id=71164
AIX 6.1 TL 9 : bos.net.tcp.client (U855283)

71163 aix_U854672.nasl
http://nessus.org/plugins/index.php?view=single&id=71163
AIX 6.1 TL 9 : bos.mp64 (U854672)

71162 aix_U854553.nasl
http://nessus.org/plugins/index.php?view=single&id=71162
AIX 6.1 TL 9 : bos.rte.methods (U854553)

71161 aix_U854544.nasl
http://nessus.org/plugins/index.php?view=single&id=71161
AIX 6.1 TL 9 : bos.rte.filesystem (U854544)

71160 aix_U854542.nasl
http://nessus.org/plugins/index.php?view=single&id=71160
AIX 6.1 TL 9 : devices.common.IBM.ib.rte (U854542)

daily_badip3.inc

mikrotik_mac_telnet_detect.nbin
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: