This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.
== OpenVAS plugins (17) ==
r15118 gb_ms_scom_detect_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_ms_scom_detect_win.nasl?root=openvas&view=markup
Microsoft System Center Operations Manager Detection (Windows)
r15123 803143 2013/gb_opera_mult_vuln02_jan13_macosx.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_opera_mult_vuln02_jan13_macosx.nasl?root=openvas&view=markup
Opera Multiple Vulnerabilities-02 Jan13 (Mac OS X)
r15123 803146 2013/gb_opera_mult_vuln03_jan13_macosx.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_opera_mult_vuln03_jan13_macosx.nasl?root=openvas&view=markup
Opera Multiple Vulnerabilities-03 Jan13 (Mac OS X)
r15123 803138 2013/gb_opera_mult_vuln01_jan13_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_opera_mult_vuln01_jan13_win.nasl?root=openvas&view=markup
Opera Multiple Vulnerabilities-01 Jan13 (Windows)
r15123 803141 2013/gb_opera_mult_vuln02_jan13_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_opera_mult_vuln02_jan13_win.nasl?root=openvas&view=markup
Opera Multiple Vulnerabilities-02 Jan13 (Windows)
r15123 803144 2013/gb_opera_mult_vuln03_jan13_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_opera_mult_vuln03_jan13_win.nasl?root=openvas&view=markup
Opera Multiple Vulnerabilities-03 Jan13 (Windows)
r15123 803148 2013/gb_opera_truncation_dialog_code_exec_vuln_lin.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_opera_truncation_dialog_code_exec_vuln_lin.nasl?root=openvas&view=markup
Opera Truncated Dialogs Code Execution Vulnerability (Linux)
r15123 gb_ms_groove_server_detect_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_ms_groove_server_detect_win.nasl?root=openvas&view=markup
Microsoft Groove Server Detection
r15123 803149 2013/gb_opera_truncation_dialog_code_exec_vuln_macosx.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_opera_truncation_dialog_code_exec_vuln_macosx.nasl?root=openvas&view=markup
Opera Truncated Dialogs Code Execution Vulnerability (Mac OS X)
r15123 803140 2013/gb_opera_mult_vuln01_jan13_lin.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_opera_mult_vuln01_jan13_lin.nasl?root=openvas&view=markup
Opera Multiple Vulnerabilities-01 Jan13 (Linux)
r15123 803147 2013/gb_opera_truncation_dialog_code_exec_vuln_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_opera_truncation_dialog_code_exec_vuln_win.nasl?root=openvas&view=markup
Opera Truncated Dialogs Code Execution Vulnerability (Windows)
r15123 803093 2013/gb_adobe_shockwave_player_mult_vuln_jan13_macosx.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_adobe_shockwave_player_mult_vuln_jan13_macosx.nasl?root=openvas&view=markup
Adobe Shockwave Player Multiple Vulnerabilities Jan-2013 (Mac OS X)
r15123 803150 2013/gb_nero_mediahome_server_mult_dos_vuln.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_nero_mediahome_server_mult_dos_vuln.nasl?root=openvas&view=markup
Nero MediaHome Server Multiple Remote DoS Vulnerabilities
r15123 803142 2013/gb_opera_mult_vuln02_jan13_lin.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_opera_mult_vuln02_jan13_lin.nasl?root=openvas&view=markup
Opera Multiple Vulnerabilities-02 Jan13 (Linux)
r15123 803145 2013/gb_opera_mult_vuln03_jan13_lin.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_opera_mult_vuln03_jan13_lin.nasl?root=openvas&view=markup
Opera Multiple Vulnerabilities-03 Jan13 (Linux)
r15123 803092 2013/gb_adobe_shockwave_player_mult_vuln_jan13_win.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_adobe_shockwave_player_mult_vuln_jan13_win.nasl?root=openvas&view=markup
Adobe Shockwave Player Multiple Vulnerabilities Jan-2013 (Windows)
r15123 803139 2013/gb_opera_mult_vuln01_jan13_macosx.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/2013/gb_opera_mult_vuln01_jan13_macosx.nasl?root=openvas&view=markup
Opera Multiple Vulnerabilities-01 Jan13 (Mac OS X)
== Metasploit modules (9) ==
r16301
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/multi/browser/java_jre17_jmxbean.rb
Java Applet JMX Remote Code Execution
r16303
http://metasploit.com/redmine/projects/framework/repository/entry/modules/payloads/singles/ruby/shell/reverse_tcp.rb
Ruby Command Shell, Reverse TCP
r16303 http://metasploit.com/redmine/projects/framework/repository/entry/modules/payloads/singles/ruby/shell/bind_tcp.rb
Ruby Command Shell, Bind TCP
r16303
http://metasploit.com/redmine/projects/framework/repository/entry/modules/payloads/singles/ruby/shell/bind_tcp_ipv6.rb
Ruby Command Shell, Bind TCP IPv6
r16305
http://metasploit.com/redmine/projects/framework/repository/entry/modules/payloads/singles/ruby/shell_reverse_tcp.rb
Ruby Command Shell, Reverse TCP
r16305 http://metasploit.com/redmine/projects/framework/repository/entry/modules/payloads/singles/ruby/shell_bind_tcp.rb
Ruby Command Shell, Bind TCP
r16305
http://metasploit.com/redmine/projects/framework/repository/entry/modules/payloads/singles/ruby/shell/bind_tcp_ipv6.rb
Ruby Command Shell, Bind TCP IPv6
r16306
http://metasploit.com/redmine/projects/framework/repository/entry/modules/payloads/singles/ruby/shell_bind_tcp_ipv6.rb
Ruby Command Shell, Bind TCP IPv6
r16308
http://metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/http/wordpress_pingback_access.rb
Wordpress Pingback Locator
== Nessus plugins (8) ==
63475 ubuntu_USN-1684-1.nasl
http://nessus.org/plugins/index.php?view=single&id=63475
USN-1684-1 : linux-ec2 vulnerability
63474 ubuntu_USN-1683-1.nasl
http://nessus.org/plugins/index.php?view=single&id=63474
USN-1683-1 : linux vulnerability
63473 suse_flash-player-8417.nasl
http://nessus.org/plugins/index.php?view=single&id=63473
SuSE 10 Security Update : flash-player (ZYPP Patch Number 8417)
63472 sl_20130108_thunderbird_on_SL5_x.nasl
http://nessus.org/plugins/index.php?view=single&id=63472
Scientific Linux Security Update : thunderbird on SL5.x, SL6.x
i386/x86_64
63471 sl_20130108_firefox_on_SL5_x.nasl
http://nessus.org/plugins/index.php?view=single&id=63471
Scientific Linux Security Update : firefox on SL5.x, SL6.x i386/x86_64
63470 freebsd_pkg_97c22a945b8b11e2b131000c299b62e1.nasl
http://nessus.org/plugins/index.php?view=single&id=63470
FreeBSD : nagios -- buffer overflow in history.cgi
(97c22a94-5b8b-11e2-b131-000c299b62e1)
63469 freebsd_pkg_46bd747b5b8411e2b06d00262d5ed8ee.nasl
http://nessus.org/plugins/index.php?view=single&id=63469
FreeBSD : chromium -- multiple vulnerabilities
(46bd747b-5b84-11e2-b06d-00262d5ed8ee)
63468 google_chrome_24_0_1312_52.nasl
http://nessus.org/plugins/index.php?view=single&id=63468
Google Chrome < 24.0.1312.52 Multiple Vulnerabilities
_______________________________________________
Sent through the dev mailing list
↧
new scripts/modules/exploits added to Nmap, OpenVAS, Metasploit, and Nessus
↧