Nmap Development mailing list archives

New VA Modules: MSF: 6


From: New VA Module Alert Service <postmaster () insecure org>
Date: Sun, 1 Sep 2013 10:00:14 +0000 (UTC)

This report describes any new scripts/modules/exploits added to Nmap,
Metasploit, Nessus, and OpenVAS since yesterday.

== Metasploit modules (6) ==

2d69174c 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/payloads/stagers/python/bind_tcp.rb
Python Bind TCP Stager

2d69174c 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/payloads/stagers/python/reverse_tcp.rb
Python Reverse TCP Stager

2d69174c 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/payloads/stages/python/meterpreter.rb
Python Meterpreter

4a6bf1da 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/hp_loadrunner_writefilestring.rb
HP LoadRunner lrFileIOService ActiveX WriteFileString Remote Code
Execution

0a1b078b 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/ms13_058_cflatmarkuppointer.rb
MS13-058 Microsoft Internet Explorer CFlatMarkupPointer Use-After-Free

f4e09100 
https://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/ms13_059_cflatmarkuppointer.rb
MS13-058 Microsoft Internet Explorer CFlatMarkupPointer Use-After-Free
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: