Nmap Development mailing list archives
New VA Modules: OpenVAS: 2, MSF: 8, Nessus: 4
From: New VA Module Alert Service <postmaster () insecure org>
Date: Tue, 6 Nov 2012 10:00:50 -0800 (PST)
This report describes any new scripts/modules/exploits added to Nmap, OpenVAS, Metasploit, and Nessus since yesterday. == OpenVAS plugins (2) == r14438 gb_symphony_56094.nasl http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_symphony_56094.nasl?root=openvas&view=markup Symphony Multiple Remote Security Vulnerabilities r14438 gb_sitescope_getSiteScopeConfiguration.nasl http://wald.intevation.org/scm/viewvc.php/trunk/openvas-plugins/scripts/gb_sitescope_getSiteScopeConfiguration.nasl?root=openvas&view=markup HP SiteScope SOAP Call getSiteScopeConfiguration Remote Code Execution Vulnerability == Metasploit modules (8) == r16040 http://metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/scada/digi_realport_version.rb Digi RealPort Serial Server Version r16040 http://metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/scada/digi_realport_serialport_scan.rb Digi RealPort Serial Server Port Scanner r16041 http://metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/scada/digi_addp_version.rb Digi ADDP Information Discovery r16041 http://metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/scada/digi_addp_reboot.rb Digi ADDP Remote Reboot Initiator r16042 http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/emc/networker_format_string.rb EMC Networker Format String r16043 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/manage/smart_migrate.rb Windows Manage Process Migration r16043 http://metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/winrm/winrm_cmd.rb WinRM Command Runner r16043 http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/winrm/winrm_script_exec.rb WinRM VBS Remote Code Execution == Nessus plugins (4) == 62813 symphony_cms_retrieve_password_xss.nasl http://nessus.org/plugins/index.php?view=single&id=62813 Symphony CMS Password Retrieval Script XSS 62812 arcserve_backup_ca20121018.nasl http://nessus.org/plugins/index.php?view=single&id=62812 CA ARCserve Backup Multiple Vulnerabilities (CA20121018) (credentialed check) 62811 arcserve_backup_server_installed.nasl http://nessus.org/plugins/index.php?view=single&id=62811 CA ARCserve Backup Server Installed (credentialed check) 62810 arcserve_backup_agent_installed.nasl http://nessus.org/plugins/index.php?view=single&id=62810 CA ARCserve Backup Agent Installed _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- New VA Modules: OpenVAS: 2, MSF: 8, Nessus: 4 New VA Module Alert Service (Nov 06)