Nmap Development mailing list archives

New VA Modules: MSF: 3, Nessus: 6


From: New VA Module Alert Service <postmaster () insecure org>
Date: Sat, 14 Apr 2012 10:00:24 -0700 (PDT)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== Metasploit modules (3) ==

r15105 http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/linux/http/vcms_upload.rb
V-CMS PHP File Upload and Execute

r15106 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/annotation_objects_uninitialized_pointer_rce.rb
Quest InTrust Annotation Objects uninitialized pointer remote code
execution

r15106 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/fileformat/cyberlink_p2g_bof.rb
CyberLink Power2Go name attribute (.p2g) Stack Buffer Overflow Exploit

== Nessus plugins (6) ==

58750 nginx_1_0_15.nasl
http://nessus.org/plugins/index.php?view=single&id=58750
nginx 1.0.7 - 1.0.14 / 1.1.3 - 1.1.18 ngx_http_mp4_module Buffer
Overflow

58749 citrix_xenserver_workload_balancer_detect.nasl
http://nessus.org/plugins/index.php?view=single&id=58749
Citrix XenServer Workload Balancer Detection

58748 dolibarr_2011_4814.nasl
http://nessus.org/plugins/index.php?view=single&id=58748
Dolibarr Multiple Script URI XSS

58747 dolibarr_2011_4329.nasl
http://nessus.org/plugins/index.php?view=single&id=58747
Dolibarr 3.1.0 admin/company.php username Parameter XSS

58746 dolibarr_passwordforgotten_lfi.nasl
http://nessus.org/plugins/index.php?view=single&id=58746
Dolibarr passwordforgotten.php theme Parameter Local File Inclusion

58745 dolibarr_detect.nasl
http://nessus.org/plugins/index.php?view=single&id=58745
Dolibarr Detection
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: