Nmap Development mailing list archives

New VA Modules: OpenVAS: 8, MSF: 2, Nessus: 7


From: New VA Module Alert Service <postmaster () insecure org>
Date: Thu, 6 Jan 2011 10:00:52 -0800 (PST)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== OpenVAS plugins (8) ==

r9892 801690 nmap_nse/gb_nmap_dns_recursion.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/nmap_nse/gb_nmap_dns_recursion.nasl?root=openvas&view=markup
Nmap NSE: DNS Recursion

r9892 801688 nmap_nse/gb_nmap_dns_random_srcport.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/nmap_nse/gb_nmap_dns_random_srcport.nasl?root=openvas&view=markup
Nmap NSE: DNS Random Source Ports

r9892 801686 nmap_nse/gb_nmap_rpcinfo.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/nmap_nse/gb_nmap_rpcinfo.nasl?root=openvas&view=markup
Nmap NSE: RPC Info

r9892 801694 nmap_nse/gb_nmap_db2_info.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/nmap_nse/gb_nmap_db2_info.nasl?root=openvas&view=markup
Nmap NSE: DB2 Info

r9892 801691 nmap_nse/gb_nmap_dns_zone_transfer.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/nmap_nse/gb_nmap_dns_zone_transfer.nasl?root=openvas&view=markup
Nmap NSE: DNS Zone Transfer

r9892 801685 nmap_nse/gb_nmap_finger.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/nmap_nse/gb_nmap_finger.nasl?root=openvas&view=markup
Nmap NSE: Finger

r9892 801693 nmap_nse/gb_nmap_dhcp_discover.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/nmap_nse/gb_nmap_dhcp_discover.nasl?root=openvas&view=markup
Nmap NSE: DHCP Discover

r9892 801689 nmap_nse/gb_nmap_dns_random_txid.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/nmap_nse/gb_nmap_dns_random_txid.nasl?root=openvas&view=markup
Nmap NSE: DNS Random TXID

== Metasploit modules (2) ==

r11483 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/escalate/bypassuac.rb
Windows UAC Protection Bypass

r11485 http://metasploit.com/redmine/projects/framework/repository/entry/modules/payloads/singles/windows/speak_pwned.rb
Windows Speech API - Say "You Got Pwned!"

== Nessus plugins (7) ==

51418 hp_storageworks_default_accts.nasl
http://nessus.org/plugins/index.php?view=single&id=51418
HP StorageWorks MSA P2000 Default Credentials

51417 redhat-RHSA-2011-0004.nasl
http://nessus.org/plugins/index.php?view=single&id=51417
RHSA-2011-0004: kernel

51416 gentoo_GLSA-201101-01.nasl
http://nessus.org/plugins/index.php?view=single&id=51416
[GLSA-201101-01] gif2png: User-assisted execution of arbitrary code

51415 fedora_2010-19033.nasl
http://nessus.org/plugins/index.php?view=single&id=51415
Fedora 14 2010-19033

51414 fedora_2010-19022.nasl
http://nessus.org/plugins/index.php?view=single&id=51414
Fedora 13 2010-19022

51413 fedora_2010-19011.nasl
http://nessus.org/plugins/index.php?view=single&id=51413
Fedora 13 2010-19011

51412 fedora_2010-18976.nasl
http://nessus.org/plugins/index.php?view=single&id=51412
Fedora 14 2010-18976
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: