Nmap Development mailing list archives

New VA Modules: MSF: 1, Nessus: 17, OpenVAS: 6


From: New VA Module Alert Service <postmaster () insecure org>
Date: Fri, 19 Dec 2014 10:00:35 +0000 (UTC)

This report describes any new scripts/modules/exploits added to Nmap,
Metasploit, Nessus, and OpenVAS since yesterday.

== Metasploit modules (1) ==

e4064279 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/fileformat/ms14_060_sandworm.rb
MS14-060 Microsoft Windows OLE Package Manager Code Execution

== Nessus plugins (17) ==

80104 firebird_local_cve-2014-9323.nasl
http://nessus.org/plugins/index.php?view=single&id=80104
Firebird SQL Server Remote Denial of Service (CVE-2014-9323)

80102 ssl_ca_setup.nasl
http://nessus.org/plugins/index.php?view=single&id=80102
SSL Custom CA Setup

80101 ipmi_passhash_disclosure.nasl
http://nessus.org/plugins/index.php?view=single&id=80101
IPMI v2.0 Password Hash Disclosure

80100 sl_20141217_kernel_on_SL5_x.nasl
http://nessus.org/plugins/index.php?view=single&id=80100
Scientific Linux Security Update : kernel on SL5.x i386/x86_64

80099 sl_20141216_kernel_on_SL6_x.nasl
http://nessus.org/plugins/index.php?view=single&id=80099
Scientific Linux Security Update : kernel on SL6.x i386/x86_64

80098 redhat-RHSA-2014-2010.nasl
http://nessus.org/plugins/index.php?view=single&id=80098
RHEL 7 : kernel (RHSA-2014:2010)

80097 redhat-RHSA-2014-2009.nasl
http://nessus.org/plugins/index.php?view=single&id=80097
RHEL 6 : kernel (RHSA-2014:2009)

80096 redhat-RHSA-2014-2008.nasl
http://nessus.org/plugins/index.php?view=single&id=80096
RHEL 5 : kernel (RHSA-2014:2008)

80095 openSUSE-2014-786.nasl
http://nessus.org/plugins/index.php?view=single&id=80095
openSUSE Security Update : MozillaThunderbird (openSUSE-SU-2014:1654-1)

80094 openSUSE-2014-785.nasl
http://nessus.org/plugins/index.php?view=single&id=80094
openSUSE Security Update : seamonkey (openSUSE-SU-2014:1656-1)

80093 openSUSE-2014-784.nasl
http://nessus.org/plugins/index.php?view=single&id=80093
openSUSE Security Update : seamonkey (openSUSE-SU-2014:1655-1)

80092 fedora_2014-16861.nasl
http://nessus.org/plugins/index.php?view=single&id=80092
Fedora 20 : tcpdump-4.5.1-3.fc20 (2014-16861)

80091 fedora_2014-16607.nasl
http://nessus.org/plugins/index.php?view=single&id=80091
Fedora 20 : bind-9.9.4-17.P2.fc20 (2014-16607)

80090 fedora_2014-16350.nasl
http://nessus.org/plugins/index.php?view=single&id=80090
Fedora 20 : pam-1.1.8-2.fc20 (2014-16350)

80089 fedora_2014-16168.nasl
http://nessus.org/plugins/index.php?view=single&id=80089
Fedora 21 : cpio-2.11-33.fc21 (2014-16168)

80088 centos_RHSA-2014-1997.nasl
http://nessus.org/plugins/index.php?view=single&id=80088
CentOS 6 : kernel (CESA-2014:1997)

firebird_installed.nbin

== OpenVAS plugins (6) ==

r877 2014/gb_symantec_web_gateway_71620.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/gb_symantec_web_gateway_71620.nasl?root=openvas-nvts&view=markup
Symantec Web Gateway Command Injection Vulnerability

r877 2014/sw_typo3_translations_php_file_disclosure.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/sw_typo3_translations_php_file_disclosure.nasl?root=openvas-nvts&view=markup
TYPO3 Translations.php File Disclosure Vulnerability

r878 gb_xenserver_version.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/gb_xenserver_version.nasl?root=openvas-nvts&view=markup
Citrix XenServer Detection

r878 2014/gb_xenserver_ctx200288.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/gb_xenserver_ctx200288.nasl?root=openvas-nvts&view=markup
Citrix XenServer Multiple Security Updates

r878 2014/gb_xenserver_ctx200223.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/gb_xenserver_ctx200223.nasl?root=openvas-nvts&view=markup
Citrix XenServer Shellshock Security Update

r878 2014/gb_xenserver_ctx140984.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/gb_xenserver_ctx140984.nasl?root=openvas-nvts&view=markup
Citrix XenServer Multiple Security Updates
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: