Nmap Development mailing list archives
New VA Modules: MSF: 24
From: New VA Module Alert Service <postmaster () insecure org>
Date: Mon, 3 Nov 2014 10:00:16 +0000 (UTC)
This report describes any new scripts/modules/exploits added to Nmap, Metasploit, Nessus, and OpenVAS since yesterday. == Metasploit modules (24) == f956c8d9 https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/post/multi/manage/shell_to_meterpreter.rb Shell to Meterpreter Upgrade b770745e https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/encoders/cmd/echo.rb Echo Command Encoder b770745e https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/encoders/cmd/perl.rb Perl Command Encoder 299d9afa https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/linux/http/centreon_sqli_exec.rb Centreon SQL and Command Injection d328b2c2 https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/http/trackit_file_upload.rb Numara / BMC Track-It! FileStorageService Arbitrary File Upload 7dbfa19e https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/gather/trackit_sql_domain_creds.rb BMC / Numara Track-It! Domain Administrator and SQL Server User Password Disclosure 24286885 https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/unix/webapp/joomla_akeeba_exec.rb Joomla / Akeeba Kickstart Remote Code Execution 472985a8 https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/http/buffalo_login.rb Buffalo NAS Login Utility 6092e840 https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/multi/misc/hp_data_protector_exec_integutil.rb HP Data Protector EXEC_INTEGUTIL Remote Code Execution 85e6febe https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/post/multi/gather/lastpass_creds.rb LastPass Master Password Extractor e4064279 https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/fileformat/ms14_060_sandworm.rb MS14-060 Microsoft Windows OLE Package Manager Code Execution bf92769b https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/admin/mssql/mssql_escalate_dbowner_sqli.rb Microsoft SQL Server - Escalate Db_Owner - SQLi 0ede70e7 https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/multi/http/cups_bash_env_exec.rb CUPS Filter Bash Environment Variable Code Injection c991c5e3 https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/encoders/cmd/generic_sh.rb Generic Shell Variable Substitution Command Encoder 4e6f6176 https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/unix/webapp/joomla_akeeba_unserialize.rb Joomla Akeeba Kickstart Unserialize Remote Code Execution 70b13819 https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/http/mybook_live_login.rb Western Digital MyBook Live Login Utility a75186d7 https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/local/ms14_058_track_popup_menu.rb Windows TrackPopupMenu Win32k NULL Pointer Dereference f119abbf https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/praedasploit/xerox_workcentre_5XXX_ldap.rb Xerox workcentre 5735 LDAP credential extractor 0b225d94 https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/praedasploit/xerox_pwd_extract.rb Xerox Administrator Console Password Extract 64c206fa https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/server/wget_symlink_file_write.rb GNU Wget FTP Symlink Arbitrary Filesystem Access 9021e4da https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/unix/misc/xerox_mfp.rb Xerox reverse shell 0e42cf25 https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/gather/xerox_workcentre_5XXX_ldap.rb Xerox workcentre 5735 LDAP service redential extractor b17d6a66 https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/gather/xerox_pwd_extract.rb Xerox Administrator Console Password Extract 9d56f029 https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/gather/xerox_workcentre_5xxx_ldap.rb Xerox workcentre 5735 LDAP service redential extractor _______________________________________________ Sent through the dev mailing list http://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- New VA Modules: MSF: 24 New VA Module Alert Service (Nov 03)