Nmap Development mailing list archives
New VA Modules: OpenVAS: 8, MSF: 2, Nessus: 7
From: New VA Module Alert Service <postmaster () insecure org>
Date: Thu, 6 Jan 2011 10:00:52 -0800 (PST)
This report describes any new scripts/modules/exploits added to Nmap, OpenVAS, Metasploit, and Nessus since yesterday. == OpenVAS plugins (8) == r9892 801690 nmap_nse/gb_nmap_dns_recursion.nasl http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/nmap_nse/gb_nmap_dns_recursion.nasl?root=openvas&view=markup Nmap NSE: DNS Recursion r9892 801688 nmap_nse/gb_nmap_dns_random_srcport.nasl http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/nmap_nse/gb_nmap_dns_random_srcport.nasl?root=openvas&view=markup Nmap NSE: DNS Random Source Ports r9892 801686 nmap_nse/gb_nmap_rpcinfo.nasl http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/nmap_nse/gb_nmap_rpcinfo.nasl?root=openvas&view=markup Nmap NSE: RPC Info r9892 801694 nmap_nse/gb_nmap_db2_info.nasl http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/nmap_nse/gb_nmap_db2_info.nasl?root=openvas&view=markup Nmap NSE: DB2 Info r9892 801691 nmap_nse/gb_nmap_dns_zone_transfer.nasl http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/nmap_nse/gb_nmap_dns_zone_transfer.nasl?root=openvas&view=markup Nmap NSE: DNS Zone Transfer r9892 801685 nmap_nse/gb_nmap_finger.nasl http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/nmap_nse/gb_nmap_finger.nasl?root=openvas&view=markup Nmap NSE: Finger r9892 801693 nmap_nse/gb_nmap_dhcp_discover.nasl http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/nmap_nse/gb_nmap_dhcp_discover.nasl?root=openvas&view=markup Nmap NSE: DHCP Discover r9892 801689 nmap_nse/gb_nmap_dns_random_txid.nasl http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/nmap_nse/gb_nmap_dns_random_txid.nasl?root=openvas&view=markup Nmap NSE: DNS Random TXID == Metasploit modules (2) == r11483 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/escalate/bypassuac.rb Windows UAC Protection Bypass r11485 http://metasploit.com/redmine/projects/framework/repository/entry/modules/payloads/singles/windows/speak_pwned.rb Windows Speech API - Say "You Got Pwned!" == Nessus plugins (7) == 51418 hp_storageworks_default_accts.nasl http://nessus.org/plugins/index.php?view=single&id=51418 HP StorageWorks MSA P2000 Default Credentials 51417 redhat-RHSA-2011-0004.nasl http://nessus.org/plugins/index.php?view=single&id=51417 RHSA-2011-0004: kernel 51416 gentoo_GLSA-201101-01.nasl http://nessus.org/plugins/index.php?view=single&id=51416 [GLSA-201101-01] gif2png: User-assisted execution of arbitrary code 51415 fedora_2010-19033.nasl http://nessus.org/plugins/index.php?view=single&id=51415 Fedora 14 2010-19033 51414 fedora_2010-19022.nasl http://nessus.org/plugins/index.php?view=single&id=51414 Fedora 13 2010-19022 51413 fedora_2010-19011.nasl http://nessus.org/plugins/index.php?view=single&id=51413 Fedora 13 2010-19011 51412 fedora_2010-18976.nasl http://nessus.org/plugins/index.php?view=single&id=51412 Fedora 14 2010-18976 _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- New VA Modules: OpenVAS: 8, MSF: 2, Nessus: 7 New VA Module Alert Service (Jan 06)