Nmap Development mailing list archives

New VA Modules: OpenVAS: 2, MSF: 8


From: New VA Module Alert Service <postmaster () insecure org>
Date: Mon, 24 Oct 2011 10:00:53 -0700 (PDT)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== OpenVAS plugins (2) ==

r11844 103310 gb_PreProjects_50309.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_PreProjects_50309.nasl?root=openvas&view=markup
PreProjects Pre Studio Business Cards Designer 'page.php' SQL Injection
Vulnerability

r11844 103309 gb_oscommerce_50301.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_oscommerce_50301.nasl?root=openvas&view=markup
osCommerce Remote File Upload and File Disclosure Vulnerabilities

== Metasploit modules (8) ==

r14037 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/manage/inject_ca.rb
inject_ca - Certificate Authority Injection

r14037 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/manage/remove_ca.rb
Certificate Authority removal

r14037 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/gather/enum_hostfile.rb
Windows Gather Windows Host File Enumeration

r14037 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/manage/inject_host.rb
Windows hosts file injection

r14037 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/manage/remove_host.rb
Windows Host File Entry Removal

r14040 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/fileformat/cytel_studio_cy3.rb
Cytel Studio 9.0 (CY3 File) Stack Buffer Overflow

r14045 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/gather/credentials/enum_picasa_pwds.rb
Windows Gather Google Picasa Password Extractor

r14047 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/http/sap_mgmt_con_osexec_payload.rb
SAP Management Console OSExecute Payload Execution
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: