[prev in list] [next in list] [prev in thread] [next in thread]
List: nmap-dev
Subject: New VA Modules: OpenVAS: 2, MSF: 8
From: New VA Module Alert Service <postmaster () insecure ! org>
Date: 2011-10-24 17:00:53
Message-ID: 20111024170053.1D9178E0001 () web ! insecure ! org
[Download RAW message or body]
This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.
== OpenVAS plugins (2) ==
r11844 103310 gb_PreProjects_50309.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_PreProjects_50309.nasl?root=openvas&view=markup
PreProjects Pre Studio Business Cards Designer 'page.php' SQL Injection
Vulnerability
r11844 103309 gb_oscommerce_50301.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_oscommerce_50301.nasl?root=openvas&view=markup
osCommerce Remote File Upload and File Disclosure Vulnerabilities
== Metasploit modules (8) ==
r14037 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/manage/inject_ca.rb
inject_ca - Certificate Authority Injection
r14037 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/manage/remove_ca.rb
Certificate Authority removal
r14037 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/gather/enum_hostfile.rb
Windows Gather Windows Host File Enumeration
r14037 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/manage/inject_host.rb
Windows hosts file injection
r14037 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/manage/remove_host.rb
Windows Host File Entry Removal
r14040 http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/fileformat/cytel_studio_cy3.rb
Cytel Studio 9.0 (CY3 File) Stack Buffer Overflow
r14045 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/gather/credentials/enum_picasa_pwds.rb
Windows Gather Google Picasa Password Extractor
r14047 http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/http/sap_mgmt_con_osexec_payload.rb
SAP Management Console OSExecute Payload Execution
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic