Nmap Development mailing list archives

New VA Modules: OpenVAS: 8, Nessus: 28


From: New VA Module Alert Service <postmaster () insecure org>
Date: Thu, 5 Jan 2012 10:00:56 -0800 (PST)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== OpenVAS plugins (8) ==

r12412 103376 gb_php_booking_calendar_51119.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_php_booking_calendar_51119.nasl?root=openvas&view=markup
PHP Booking Calendar 'page_info_message' Parameter Cross Site Scripting
Vulnerability

r12412 103377 gb_QuiXplorer_50673.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_QuiXplorer_50673.nasl?root=openvas&view=markup
QuiXplorer 'index.php' Arbitrary File Upload Vulnerability

r12414 802550 gb_kingview_heap_bof_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_kingview_heap_bof_vuln.nasl?root=openvas&view=markup
WellinTech KingView 'HistoryServer.exe' Heap Based Buffer Overflow
Vulnerability

r12414 802551 gb_cocsoft_stream_down_bof_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_cocsoft_stream_down_bof_vuln.nasl?root=openvas&view=markup
CoCSoft Stream Down Buffer overflow Vulnerability

r12414 802554 gb_wordpress_cartpress_plugin_xss_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_wordpress_cartpress_plugin_xss_vuln.nasl?root=openvas&view=markup
WordPress CartPress Plugin 'tcp_post_ids' Parameter Cross Site Scripting
Vulnerability

r12414 802553 gb_wordpress_whois_plugin_xss_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_wordpress_whois_plugin_xss_vuln.nasl?root=openvas&view=markup
WordPress WHOIS Plugin 'domain' Parameter Cross-site Scripting
Vulnerability

r12414 802289 gb_wordpress_comment_rating_plugin_mult_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_wordpress_comment_rating_plugin_mult_vuln.nasl?root=openvas&view=markup
WordPress Comment Rating Plugin Multiple Vulnerabilities

r12414 802552 gb_winlog_lite_bof_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_winlog_lite_bof_vuln.nasl?root=openvas&view=markup
Sielco Sistemi Winlog PRO Buffer overflow Vulnerability

== Nessus plugins (28) ==

57432 freebsd_pkg_810df820366411e18fe300215c6a37bb.nasl
http://nessus.org/plugins/index.php?view=single&id=57432
FreeBSD : wordpress -- cross site scripting vulnerability
(810df820-3664-11e1-8fe3-00215c6a37bb)

17770 openssl_vA_0_9_7l_hpux.nasl
http://nessus.org/plugins/index.php?view=single&id=17770
OpenSSL < vA.00.09.07l on HP/UX Local Denial of Service

17769 openssl_AES_timing_attack.nasl
http://nessus.org/plugins/index.php?view=single&id=17769
OpenSSL AES Timing Attack

17768 openssl_1_0_0.nasl
http://nessus.org/plugins/index.php?view=single&id=17768
OpenSSL < 1.0.0-beta2 Denial of Service

17767 openssl_0_9_8p_1_0_0e.nasl
http://nessus.org/plugins/index.php?view=single&id=17767
OpenSSL < 0.9.8p / 1.0.0e Double Free Vulnerability

17766 openssl_0_9_8p_1_0_0b.nasl
http://nessus.org/plugins/index.php?view=single&id=17766
OpenSSL < 0.9.8p / 1.0.0b Buffer Overflow

17765 openssl_0_9_8l.nasl
http://nessus.org/plugins/index.php?view=single&id=17765
OpenSSL < 0.9.8l Multiple Vulnerabilities

17764 openssl_0_9_8k_CMS.nasl
http://nessus.org/plugins/index.php?view=single&id=17764
OpenSSL < 0.9.8k Signature Repudiation

17763 openssl_0_9_8k.nasl
http://nessus.org/plugins/index.php?view=single&id=17763
OpenSSL < 0.9.8k Denial of Service

17762 openssl_0_9_8j.nasl
http://nessus.org/plugins/index.php?view=single&id=17762
OpenSSL < 0.9.8j Signature Spoofing

17761 openssl_0_9_8i.nasl
http://nessus.org/plugins/index.php?view=single&id=17761
OpenSSL < 0.9.8i Denial of Service

17760 openssl_0_9_8f.nasl
http://nessus.org/plugins/index.php?view=single&id=17760
OpenSSL < 0.9.8f Multiple Vulnerabilities

17759 openssl_0_9_8.nasl
http://nessus.org/plugins/index.php?view=single&id=17759
OpenSSL < 0.9.8 Weak Default Configuration

17758 openssl_0_9_7m_0_9_8e.nasl
http://nessus.org/plugins/index.php?view=single&id=17758
OpenSSL < 0.9.7m / 0.9.8e Buffer Overflow

17757 openssl_0_9_7l_0_9_8d.nasl
http://nessus.org/plugins/index.php?view=single&id=17757
OpenSSL < 0.9.7l / 0.9.8d Multiple Vulnerabilities

17756 openssl_0_9_7k_0_9_8c.nasl
http://nessus.org/plugins/index.php?view=single&id=17756
OpenSSL < 0.9.7k / 0.9.8c PKCS Padding RSA Signature Forgery
Vulnerability

17755 openssl_0_9_7h_0_9_8a.nasl
http://nessus.org/plugins/index.php?view=single&id=17755
OpenSSL < 0.9.7h / 0.9.8a Protocol Version Rollback

17754 openssl_0_9_7f.nasl
http://nessus.org/plugins/index.php?view=single&id=17754
OpenSSL < 0.9.7f Insecure Temporary File Creation

17753 openssl_0_9_7c.nasl
http://nessus.org/plugins/index.php?view=single&id=17753
OpenSSL < 0.9.7c ASN.1 Decoding Vulnerabilities

17752 openssl_0_9_7_beta3.nasl
http://nessus.org/plugins/index.php?view=single&id=17752
OpenSSL < 0.9.7-beta3 Buffer Overflow

17751 openssl_0_9_7.nasl
http://nessus.org/plugins/index.php?view=single&id=17751
OpenSSL 0.9.6 CA Basic Constraints Validation Vulnerability

17750 openssl_0_9_6m_0_9_7d.nasl
http://nessus.org/plugins/index.php?view=single&id=17750
OpenSSL < 0.9.6m / 0.9.7d Denial of Service

17749 openssl_0_9_6l.nasl
http://nessus.org/plugins/index.php?view=single&id=17749
OpenSSL < 0.9.6l Denial of Service

17748 openssl_0_9_6k.nasl
http://nessus.org/plugins/index.php?view=single&id=17748
OpenSSL < 0.9.6k Denial of Service

17747 openssl_0_9_6f.nasl
http://nessus.org/plugins/index.php?view=single&id=17747
OpenSSL < 0.9.6f Denial of Service

17746 openssl_0_9_6e.nasl
http://nessus.org/plugins/index.php?view=single&id=17746
OpenSSL < 0.9.6e Multiple Vulnerabilities

17745 openssl_0_9_6b.nasl
http://nessus.org/plugins/index.php?view=single&id=17745
OpenSSL < 0.9.6b Predictable Random Generator

openssl_version.inc
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: