Home page logo
/

nmap-dev logo Nmap Development mailing list archives

New VA Modules: NSE: 1, OpenVAS: 3, MSF: 14, Nessus: 4
From: New VA Module Alert Service <postmaster () insecure org>
Date: Wed, 23 Mar 2011 10:00:37 -0700 (PDT)

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== Nmap Scripting Engine scripts (1) ==

r22713 ssl-known-key http://nmap.org/nsedoc/scripts/ssl-known-key.html
This script checks whether the SSL certificate used by a host has a
fingerprint that matches the ones in a database.

== OpenVAS plugins (3) ==

r10624 103124 gb_emc_networker_management_console_detect.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_emc_networker_management_console_detect.nasl?root=openvas&view=markup
EMC Networker Management Console Detection

r10624 103123 gb_emc_networker_detect.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_emc_networker_detect.nasl?root=openvas&view=markup
EMC Networker Detection

r10624 103125 gb_eDirectory_DHost_web_server_detect.nasl
http://wald.intevation.org/plugins/scmsvn/viewcvs.php/trunk/openvas-plugins/scripts/gb_eDirectory_DHost_web_server_detect.nasl?root=openvas&view=markup
eDirectory DHost Web Server Detection

== Metasploit modules (14) ==

r12073 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/multi/gather/multi_command.rb
Run Shell Command Resource File

r12074 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/multi/gather/run_console_rc_file.rb
Run Console Resource File

r12077 http://metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/admin/scada/igss_exec_17.rb
Interactive Graphical SCADA System Remote Command Injection

r12079 http://metasploit.com/redmine/projects/framework/repository/entry/modules/post/windows/manage/enable_rdp.rb
Microsoft Windows Enable Remote Desktop

r12081 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/http/hp_nnm_nnmRptConfig_nameParams.rb
HP OpenView NNM nnmRptConfig nameParams Buffer Overflow

r12082 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/http/hp_nnm_webappmon_ovjavalocale.rb
HP NNM CGI webappmon.exe OvJavaLocale Buffer Overflow

r12083 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/http/hp_nnm_webappmon_execvp.rb
HP NNM CGI webappmon.exe execvp Buffer Overflow

r12085 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/http/hp_nnm_nnmrptconfig_nameparams.rb
HP OpenView NNM nnmRptConfig nameParams Buffer Overflow

r12089 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/adobe_flashplayer_avm.rb
Adobe Flash Player AVM Bytecode Verification

r12095 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_uro.rb
HP OpenView Network Node Manager ovwebsnmpsrv.exe Unrecognized Option
Buffer Overflow

r12096 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_ovutil.rb
HP OpenView Network Node Manager ovwebsnmpsrv.exe ovutil Buffer Overflow

r12097 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/http/hp_nnm_ovwebsnmpsrv_main.rb
HP OpenView Network Node Manager ovwebsnmpsrv.exe main Buffer Overflow

r12098 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/http/hp_nnm_snmpviewer_actapp.rb
HP OpenView Network Node Manager snmpviewer.exe Buffer Overflow

r12102 
http://metasploit.com/redmine/projects/framework/repository/entry/modules/auxiliary/scanner/snmp/xerox_workcentre_enumusers.rb
Xerox WorkCentre User Enumeration (SNMP)

== Nessus plugins (4) ==

52756 weblogic_session_fixation.nasl
http://nessus.org/plugins/index.php?view=single&id=52756
Oracle WebLogic Server Servlet Container Session Fixation

52755 adobe_air_apsb11-05.nasl
http://nessus.org/plugins/index.php?view=single&id=52755
Adobe AIR < 2.6 Unspecified Memory Corruption (APSB11-05)

52754 macosx_10_6_7.nasl
http://nessus.org/plugins/index.php?view=single&id=52754
Mac OS X 10.6 < 10.6.7

52753 macosx_SecUpd2011-001.nasl
http://nessus.org/plugins/index.php?view=single&id=52753
Mac OS X Multiple Vulnerabilities (Security Update 2011-001)
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


  By Date           By Thread  

Current thread:
  • New VA Modules: NSE: 1, OpenVAS: 3, MSF: 14, Nessus: 4 New VA Module Alert Service (Mar 23)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]