Nmap Development mailing list archives
New VA Modules: OpenVAS: 2, MSF: 8
From: New VA Module Alert Service <postmaster () insecure org>
Date: Mon, 24 Oct 2011 10:00:53 -0700 (PDT)
This report describes any new scripts/modules/exploits added to Nmap, OpenVAS, Metasploit, and Nessus since yesterday. == OpenVAS plugins (2) == r11844 103310 gb_PreProjects_50309.nasl http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_PreProjects_50309.nasl?root=openvas&view=markup PreProjects Pre Studio Business Cards Designer 'page.php' SQL Injection Vulnerability r11844 103309 gb_oscommerce_50301.nasl http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_oscommerce_50301.nasl?root=openvas&view=markup osCommerce Remote File Upload and File Disclosure Vulnerabilities == Metasploit modules (8) == r14037 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/manage/inject_ca.rb inject_ca - Certificate Authority Injection r14037 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/manage/remove_ca.rb Certificate Authority removal r14037 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/gather/enum_hostfile.rb Windows Gather Windows Host File Enumeration r14037 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/manage/inject_host.rb Windows hosts file injection r14037 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/manage/remove_host.rb Windows Host File Entry Removal r14040 http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/fileformat/cytel_studio_cy3.rb Cytel Studio 9.0 (CY3 File) Stack Buffer Overflow r14045 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/gather/credentials/enum_picasa_pwds.rb Windows Gather Google Picasa Password Extractor r14047 http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/http/sap_mgmt_con_osexec_payload.rb SAP Management Console OSExecute Payload Execution _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- New VA Modules: OpenVAS: 2, MSF: 8 New VA Module Alert Service (Oct 24)