Goby Beta1.8.293
In this update
• Added 40 combat vulnerabilities: including Cisco HyperFlex HX storfs-asup remote command execution vulnerability (CVE-2021-1497); VMware vCenter Server remote code execution vulnerability (CVE-2021-21985); Inspur ClusterEngine remote command execution vulnerability; Weaver ecology Any file upload; UFIDA NC arbitrary code execution, etc., have been verified in actual combat, and are available for study, research and discussion.
• Add the option of not scanning network printers: filter out port 9100 to prevent network printers from working incorrectly.
• Added background scan: when exiting Goby, a pop-up box reminds that a task is being executed and asks whether to continue exiting Goby.
• Report support to export website screenshots: Export all data including assets, vulnerabilities, reports, website screenshots and icons.
• Plug-in label display: newly launched plug-ins, put them on the top for one week, add the "new" label.
• Add scan status.
• The nation flag icon is added to the language list.
• The new PoC management feature, users can open the storage location of the local PoC.
• Temporarily disable the scan to IPv6 function.
• Fix the problem that when input PoC file name press Enter to trigger a restart.
• Fix the problem that the import PoC prompt is always being imported.
• Fix the problem that the network card does not restart the service after an error is reported.
• Fix the problem that the second export of the task pop-up window is incomplete.
• Fix the problem that WebFinder cannot export all.
• The error logic of pcap not finding the network card is restored to a prompt that the network card cannot be scanned.
• Fix too many assets report cannot be loaded.
• Fix the incomplete export of excel table.
• fix other styles, copywriting, and interaction issues.
New vulnerabilities
Demos: https://github.com/gobysec/GobyVuls