Metasploit Framework 3.7.2 Released - Download
The Hacker News

Metasploit Framework 3.7.2 includes 698 exploit modules, 358 auxiliary modules, and 54 post modules, 11 new exploits, 1 new auxiliary module, and 15 new post modules.This release addresses several issues with updating the framework, adds 11 exploit / auxiliary modules and brings a plethora of new features.
Modules included are listed below. Notable modules include the Cisco Anyconnect ActiveX bug (which works against recent versions of the Cisco AnyConnect Windows Client), and the SCADA modules by sinn3r and MC. The multi-platform post-exploitation work continues with new modules for Linux and Solaris included in this release thanks to Carlos Perez. A number of password-stealing post modules are also included, courtesy of David Maloney. The updates to the signed_java_applet module are documented on the Metasploit Blog. Additionally, the cachedump module has been improved and merged thanks to great work by Mubix. New features are equally exciting, including remote registry commands for Meterpreter, import parsers moved to nokogiri streaming parsers (for quicker parsing of large XML files), and updates to the egghunter payload to help the payload bypass DEP, thanks to Corelanc0der. See other notable improvements listed below.

New Exploit Modules since 3.7.1

  • MS11-050 IE mshtml!CObjectElement Use After Free
  • AWStats Totals =< v1.14 multisort Remote Command Execution
  • IBM Tivoli Endpoint Manager POST Query Buffer Overflow
  • Cisco AnyConnect VPN Client ActiveX URL Property Download and Execute
  • Magix Musik Maker 16 .mmm Stack Buffer Overflow
  • VisiWave VWR File Parsing Vulnerability
  • GoldenFTP PASS Stack Buffer Overflow
  • DATAC RealWin SCADA Server 2 On_FC_CONNECT_FCS_a_FILE Buffer Overflow
  • 7-Technologies IGSS <= v9.00.00 b11063 IGSSdataServer.exe Stack Overflow
  • 7-Technologies IGSS 9 Data Server/Collector Packet Handling Vulnerabilities
  • 7-Technologies IGSS 9 IGSSdataServer .RMS Rename Buffer Overflow

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.