Nmap Development mailing list archives

New VA Modules: MSF: 4


From: New VA Module Alert Service <postmaster () insecure org>
Date: Sun, 9 Feb 2014 10:00:18 +0000 (UTC)

This report describes any new scripts/modules/exploits added to Nmap,
Metasploit, Nessus, and OpenVAS since yesterday.

== Metasploit modules (4) ==

d9fa0929 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/gather/enum_ad_user_comments.rb
Windows Gather Active Directory User Descriptions

9a929e75 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/linux/http/pandora_fms_exec.rb
Pandora FMS Remote Code Execution

95eb7586 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/local/powershell_cmd_upgrade.rb
Windows Command Shell Upgrade (Powershell)

a18de35f 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/wellintech_kingscada_kxclientdownload.rb
KingScada kxClientDownload.ocx ActiveX Remote Code Execution
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: