Nmap Development mailing list archives

New VA Modules: OpenVAS: 3, MSF: 4, Nessus: 2


From: New VA Module Alert Service <postmaster () insecure org>
Date: Wed, 12 Jan 2011 10:00:43 -0800 (PST)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== OpenVAS plugins (3) ==

r9929 801807 gb_wordpress_kses_library_xss_vuln.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_wordpress_kses_library_xss_vuln.nasl?root=openvas&view=markup
WordPress KSES Library Cross Site Scripting Vulnerability

r9929 901173 secpod_ms11-001.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_ms11-001.nasl?root=openvas&view=markup
Windows Backup Manager Remote Code Execution Vulnerability (2478935)

r9929 902281 secpod_ms11-002.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/secpod_ms11-002.nasl?root=openvas&view=markup
Microsoft Windows Data Access Components Remote Code Execution
Vulnerabilities (2451910)

== Metasploit modules (4) ==

r11549 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/gather/enum_shares.rb
Enumerate Shares

r11554 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/gather/checkvm.rb
Check if VM

r11555 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/gather/enum_powershell_env.rb
Enumerate Powershell Enviroment

r11556 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/gather/enum_applications.rb
Enumerate Installed Applications

== Nessus plugins (2) ==

51455 smb_nt_ms11-002.nasl
http://nessus.org/plugins/index.php?view=single&id=51455
MS11-002: Vulnerabilities in Microsoft Data Access Components Could
Allow Remote Code Execution (2451910)

51454 smb_nt_ms11-001.nasl
http://nessus.org/plugins/index.php?view=single&id=51454
MS11-001: Vulnerability in Windows Backup Manager Could Allow Remote
Code Execution (2478935)
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: