[prev in list] [next in list] [prev in thread] [next in thread] 

List:       nmap-dev
Subject:    New VA Modules: OpenVAS: 2, MSF: 8
From:       New VA Module Alert Service <postmaster () insecure ! org>
Date:       2011-10-24 17:00:53
Message-ID: 20111024170053.1D9178E0001 () web ! insecure ! org
[Download RAW message or body]

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== OpenVAS plugins (2) ==

r11844 103310 gb_PreProjects_50309.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_PreProjects_50309.nasl?root=openvas&view=markup
 PreProjects Pre Studio Business Cards Designer 'page.php' SQL Injection
Vulnerability

r11844 103309 gb_oscommerce_50301.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_oscommerce_50301.nasl?root=openvas&view=markup
 osCommerce Remote File Upload and File Disclosure Vulnerabilities

== Metasploit modules (8) ==

r14037 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/manage/inject_ca.rb
 inject_ca - Certificate Authority Injection

r14037 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/manage/remove_ca.rb
 Certificate Authority removal

r14037 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/gather/enum_hostfile.rb
 Windows Gather Windows Host File Enumeration

r14037 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/manage/inject_host.rb
 Windows hosts file injection

r14037 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/manage/remove_host.rb
 Windows Host File Entry Removal

r14040 http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/fileformat/cytel_studio_cy3.rb
 Cytel Studio 9.0 (CY3 File) Stack Buffer Overflow

r14045 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/gather/credentials/enum_picasa_pwds.rb
 Windows Gather Google Picasa Password Extractor

r14047 http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/http/sap_mgmt_con_osexec_payload.rb
 SAP Management Console OSExecute Payload Execution
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic