[prev in list] [next in list] [prev in thread] [next in thread] 

List:       nmap-dev
Subject:    New VA Modules: OpenVAS: 4, MSF: 2, Nessus: 13
From:       New VA Module Alert Service <postmaster () insecure ! org>
Date:       2013-06-28 9:59:04
Message-ID: 20130628100030.C1100734F () hb ! insecure ! org
[Download RAW message or body]

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== OpenVAS plugins (4) ==

r16833 803676 2013/gb_google_chrome_clickjacking_vuln_jun13_macosx.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_google_chrome_clickjacking_vuln_jun13_macosx.nasl?root=openvas&view=markup
 Google Chrome Clickjacking Vulnerability June13 (MAC OS X)

r16833 803675 2013/gb_google_chrome_clickjacking_vuln_jun13_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_google_chrome_clickjacking_vuln_jun13_win.nasl?root=openvas&view=markup
 Google Chrome Clickjacking Vulnerability June13 (Windows)

r16833 803720 2013/gb_trendnet_print_server_authe_bypass_vuln.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_trendnet_print_server_authe_bypass_vuln.nasl?root=openvas&view=markup
 TRENDnet Print Server Authentication Bypass Vulnerability

r16833 802056 2013/gb_mit_krb5_kpasswd_pingpong_dos_vuln.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_mit_krb5_kpasswd_pingpong_dos_vuln.nasl?root=openvas&view=markup
 MIT Kerberos 5 kpasswd UDP Packet Denial Of Service Vulnerability

== Metasploit modules (2) ==

8a96b7f9 https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/multi/browser/java_jre17_provider_skeleton.rb
 Java Applet ProviderSkeleton Insecure Invoke Method

c829a7ec https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/smtp/smtp_relay.rb
 SMTP Open Relay Detection

== Nessus plugins (13) ==

67008 op5_monitor_6_1_0.nasl
http://nessus.org/plugins/index.php?view=single&id=67008
op5 Monitor < 6.1.0 Information Disclosure and Security Bypass
Vulnerabilities

67007 sybase_easerver_631_sp1_pl07.nasl
http://nessus.org/plugins/index.php?view=single&id=67007
Sybase EAServer 6.3.1 < 6.3.1.07 Build 63107 / 6.2 < 6.2.0.12 Build
62012 Multiple Vulnerabilities

67006 sybase_easerver_detect.nasl
http://nessus.org/plugins/index.php?view=single&id=67006
Sybase EAServer Detect

67005 account_hpsupport_badg3r5.nasl
http://nessus.org/plugins/index.php?view=single&id=67005
Default Password (badg3r5) for 'HPSupport' Account

67004 symantec_sms_sym_07-019.nasl
http://nessus.org/plugins/index.php?view=single&id=67004
Symantec Mail Security for Exchange / Domino RAR and CAB Parsing Heap
Overflow

67003 symantec_sms_smtp_sym_07-019.nasl
http://nessus.org/plugins/index.php?view=single&id=67003
Symantec Mail Security for SMTP RAR and CAB Parsing Heap Overflow

67002 symantec_decomposer_sym07-019.nasl
http://nessus.org/plugins/index.php?view=single&id=67002
Symantec Antivirus Scan Engine RAR and CAB Parsing Heap Overflow

67001 ubuntu_USN-1891-1.nasl
http://nessus.org/plugins/index.php?view=single&id=67001
Ubuntu 12.04 LTS / 12.10 / 13.04 : thunderbird vulnerabilities
(USN-1891-1)

67000 ubuntu_USN-1890-1.nasl
http://nessus.org/plugins/index.php?view=single&id=67000
Ubuntu 12.04 LTS / 12.10 / 13.04 : firefox vulnerabilities (USN-1890-1)

66999 freebsd_pkg_b3fcb387de4b11e2b1c60025905a4771.nasl
http://nessus.org/plugins/index.php?view=single&id=66999
FreeBSD : mozilla -- multiple vulnerabilities
(b3fcb387-de4b-11e2-b1c6-0025905a4771)

66998 centos_RHSA-2013-0983.nasl
http://nessus.org/plugins/index.php?view=single&id=66998
CentOS : RHSA-2013-0983

66997 centos_RHSA-2013-0982.nasl
http://nessus.org/plugins/index.php?view=single&id=66997
CentOS : RHSA-2013-0982

66996 centos_RHSA-2013-0981.nasl
http://nessus.org/plugins/index.php?view=single&id=66996
CentOS : RHSA-2013-0981
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic