Nmap Development mailing list archives

New VA Modules: NSE: 1, MSF: 2, Nessus: 16, OpenVAS: 3


From: New VA Module Alert Service <postmaster () insecure org>
Date: Wed, 18 Jun 2014 10:00:36 +0000 (UTC)

This report describes any new scripts/modules/exploits added to Nmap,
Metasploit, Nessus, and OpenVAS since yesterday.

== Nmap Scripting Engine scripts (1) ==

r33030 s7-info http://nmap.org/nsedoc/scripts/s7-info.html
https://svn.nmap.org/nmap/scripts/s7-info.nse
Author: Stephen Hilt (Digital Bond)
Enumerates Siemens S7 PLC Devices and collects their device information.
This script is based off PLCScan that was developed by Positive Research
and Scadastrangelove (https://code.google.com/p/plcscan/). This script
is meant to provide the same functionality as PLCScan inside of Nmap.
Some of the information that is collected by PLCScan was not ported
over; this information can be parsed out of the packets that are
received.

== Metasploit modules (2) ==

9627bae9 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/multi/misc/java_jdwp_debugger.rb
Java Debugging Wire Protocol Scanner

e4d14194 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/multi/http/rocket_servergraph_file_requestor_rce.rb
Rocket Servergraph Admin Center fileRequestor Remote Code Execution

== Nessus plugins (16) ==

76089 asterisk_ast_2014_008.nasl
http://nessus.org/plugins/index.php?view=single&id=76089
Asterisk PJSIP Channel Driver Multiple DoS Vulnerabilities (AST-2014-005
/ AST-2014-008)

76088 asterisk_ast_2014_007.nasl
http://nessus.org/plugins/index.php?view=single&id=76088
Asterisk HTTP Session Handling DoS (AST-2014-007)

76087 asterisk_ast_2014_006.nasl
http://nessus.org/plugins/index.php?view=single&id=76087
Asterisk Manager Interface MixMonitor Privilege Escalation
(AST-2014-006)

76086 solaris10_151355.nasl
http://nessus.org/plugins/index.php?view=single&id=76086
Solaris 10 (sparc) : 151355-01

76085 openSUSE-2014-423.nasl
http://nessus.org/plugins/index.php?view=single&id=76085
openSUSE Security Update : flash-player (openSUSE-SU-2014:0798-1)

76084 gentoo_GLSA-201406-16.nasl
http://nessus.org/plugins/index.php?view=single&id=76084
GLSA-201406-16 : cups-filters: Multiple vulnerabilities

76083 fedora_2014-7320.nasl
http://nessus.org/plugins/index.php?view=single&id=76083
Fedora 19 : kernel-3.14.7-100.fc19 (2014-7320)

76082 debian_DSA-2961.nasl
http://nessus.org/plugins/index.php?view=single&id=76082
Debian DSA-2961-1 : php5 - security update

76081 debian_DSA-2960.nasl
http://nessus.org/plugins/index.php?view=single&id=76081
Debian DSA-2960-1 : icedove - security update

76080 aix_IV59636.nasl
http://nessus.org/plugins/index.php?view=single&id=76080
AIX 5.3 TL 12 : ntp (IV59636)

76079 aix_IV58413.nasl
http://nessus.org/plugins/index.php?view=single&id=76079
AIX 6.1 TL 7 : ntp (IV58413)

76078 aix_IV58068.nasl
http://nessus.org/plugins/index.php?view=single&id=76078
AIX 6.1 TL 8 : ntp (IV58068)

76077 aix_IV56575.nasl
http://nessus.org/plugins/index.php?view=single&id=76077
AIX 7.1 TL 1 : ntp (IV56575)

76076 aix_IV56324.nasl
http://nessus.org/plugins/index.php?view=single&id=76076
AIX 7.1 TL 3 : ntp (IV56324)

76075 aix_IV56213.nasl
http://nessus.org/plugins/index.php?view=single&id=76075
AIX 6.1 TL 9 : ntp (IV56213)

76074 aix_IV55365.nasl
http://nessus.org/plugins/index.php?view=single&id=76074
AIX 7.1 TL 2 : ntp (IV55365)

== OpenVAS plugins (3) ==

r508 702960 2014/deb_2960.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2960.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2960-1 (icedove - security update

r508 702961 2014/deb_2961.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2961.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2961-1 (php5 - security update

r508 702962 2014/deb_2962.nasl
https://wald.intevation.org/scm/viewvco.php/scripts/2014/deb_2962.nasl?root=openvas-nvts&view=markup
Debian Security Advisory DSA 2962-1 (nspr - security update
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: