Nmap Development mailing list archives

New VA Modules: MSF: 24


From: New VA Module Alert Service <postmaster () insecure org>
Date: Mon, 3 Nov 2014 10:00:16 +0000 (UTC)

This report describes any new scripts/modules/exploits added to Nmap,
Metasploit, Nessus, and OpenVAS since yesterday.

== Metasploit modules (24) ==

f956c8d9 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/post/multi/manage/shell_to_meterpreter.rb
Shell to Meterpreter Upgrade

b770745e https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/encoders/cmd/echo.rb
Echo Command Encoder

b770745e https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/encoders/cmd/perl.rb
Perl Command Encoder

299d9afa 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/linux/http/centreon_sqli_exec.rb
Centreon SQL and Command Injection

d328b2c2 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/http/trackit_file_upload.rb
Numara / BMC Track-It! FileStorageService Arbitrary File Upload

7dbfa19e 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/gather/trackit_sql_domain_creds.rb
BMC / Numara Track-It! Domain Administrator and SQL Server User Password
Disclosure

24286885 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/unix/webapp/joomla_akeeba_exec.rb
Joomla / Akeeba Kickstart Remote Code Execution

472985a8 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/http/buffalo_login.rb
Buffalo NAS Login Utility

6092e840 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/multi/misc/hp_data_protector_exec_integutil.rb
HP Data Protector EXEC_INTEGUTIL Remote Code Execution

85e6febe 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/post/multi/gather/lastpass_creds.rb
LastPass Master Password Extractor

e4064279 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/fileformat/ms14_060_sandworm.rb
MS14-060 Microsoft Windows OLE Package Manager Code Execution

bf92769b 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/admin/mssql/mssql_escalate_dbowner_sqli.rb
Microsoft SQL Server - Escalate Db_Owner - SQLi

0ede70e7 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/multi/http/cups_bash_env_exec.rb
CUPS Filter Bash Environment Variable Code Injection

c991c5e3 https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/encoders/cmd/generic_sh.rb
Generic Shell Variable Substitution Command Encoder

4e6f6176 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/unix/webapp/joomla_akeeba_unserialize.rb
Joomla Akeeba Kickstart Unserialize Remote Code Execution

70b13819 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/http/mybook_live_login.rb
Western Digital MyBook Live Login Utility

a75186d7 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/local/ms14_058_track_popup_menu.rb
Windows TrackPopupMenu Win32k NULL Pointer Dereference

f119abbf 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/praedasploit/xerox_workcentre_5XXX_ldap.rb
Xerox workcentre 5735 LDAP credential extractor

0b225d94 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/praedasploit/xerox_pwd_extract.rb
Xerox Administrator Console Password Extract

64c206fa 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/server/wget_symlink_file_write.rb
GNU Wget FTP Symlink Arbitrary Filesystem Access

9021e4da https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/unix/misc/xerox_mfp.rb
Xerox reverse shell

0e42cf25 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/gather/xerox_workcentre_5XXX_ldap.rb
Xerox workcentre 5735 LDAP service redential extractor

b17d6a66 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/gather/xerox_pwd_extract.rb
Xerox Administrator Console Password Extract

9d56f029 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/gather/xerox_workcentre_5xxx_ldap.rb
Xerox workcentre 5735 LDAP service redential extractor
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: