Nmap Development mailing list archives

New VA Modules: OpenVAS: 2, MSF: 8, Nessus: 4


From: New VA Module Alert Service <postmaster () insecure org>
Date: Tue, 6 Nov 2012 10:00:50 -0800 (PST)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== OpenVAS plugins (2) ==

r14438 gb_symphony_56094.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_symphony_56094.nasl?root=openvas&view=markup
Symphony Multiple Remote Security Vulnerabilities

r14438 gb_sitescope_getSiteScopeConfiguration.nasl
http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_sitescope_getSiteScopeConfiguration.nasl?root=openvas&view=markup
HP SiteScope SOAP Call getSiteScopeConfiguration Remote Code Execution
Vulnerability

== Metasploit modules (8) ==

r16040 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/scada/digi_realport_version.rb
Digi RealPort Serial Server Version

r16040 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/scada/digi_realport_serialport_scan.rb
Digi RealPort Serial Server Port Scanner

r16041 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/scada/digi_addp_version.rb
Digi ADDP Information Discovery

r16041 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/scada/digi_addp_reboot.rb
Digi ADDP Remote Reboot Initiator

r16042 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/emc/networker_format_string.rb
EMC Networker Format String

r16043 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/manage/smart_migrate.rb
Windows Manage Process Migration

r16043 http://metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/winrm/winrm_cmd.rb
WinRM Command Runner

r16043 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/winrm/winrm_script_exec.rb
WinRM VBS Remote Code Execution

== Nessus plugins (4) ==

62813 symphony_cms_retrieve_password_xss.nasl
http://nessus.org/plugins/index.php?view=single&id=62813
Symphony CMS Password Retrieval Script XSS

62812 arcserve_backup_ca20121018.nasl
http://nessus.org/plugins/index.php?view=single&id=62812
CA ARCserve Backup Multiple Vulnerabilities (CA20121018) (credentialed
check)

62811 arcserve_backup_server_installed.nasl
http://nessus.org/plugins/index.php?view=single&id=62811
CA ARCserve Backup Server Installed (credentialed check)

62810 arcserve_backup_agent_installed.nasl
http://nessus.org/plugins/index.php?view=single&id=62810
CA ARCserve Backup Agent Installed
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: