automatic module_metadata_base.json update

This commit is contained in:
Metasploit 2022-01-18 14:07:21 -06:00
parent 8852eaa6b8
commit 1931df766e
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 28 additions and 29 deletions

View File

@ -2145,7 +2145,7 @@
"references": [
"CVE-2015-6922",
"ZDI-15-448",
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/kaseya-vsa-vuln-2.txt",
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/Kaseya/kaseya-vsa-vuln-2.txt",
"URL-https://seclists.org/bugtraq/2015/Sep/132"
],
"platform": "",
@ -2167,7 +2167,7 @@
"https"
],
"targets": null,
"mod_time": "2020-10-02 17:38:06 +0000",
"mod_time": "2022-01-13 18:47:11 +0000",
"path": "/modules/auxiliary/admin/http/kaseya_master_admin.rb",
"is_install_path": true,
"ref_name": "admin/http/kaseya_master_admin",
@ -3224,7 +3224,7 @@
"references": [
"CVE-2016-5676",
"US-CERT-VU-856152",
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/nuuo-nvr-vulns.txt",
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/NUUO/nuuo-nvr-vulns.txt",
"URL-https://seclists.org/bugtraq/2016/Aug/45"
],
"platform": "",
@ -3246,7 +3246,7 @@
"https"
],
"targets": null,
"mod_time": "2020-10-02 17:38:06 +0000",
"mod_time": "2022-01-13 18:43:41 +0000",
"path": "/modules/auxiliary/admin/http/nuuo_nvrmini_reset.rb",
"is_install_path": true,
"ref_name": "admin/http/nuuo_nvrmini_reset",
@ -6321,7 +6321,7 @@
"CVE-2019-1621",
"URL-https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190626-dcnm-bypass",
"URL-https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190626-dcnm-file-dwnld",
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/exploits/metasploit/cisco_dcnm_download.rb",
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/Cisco/cisco-dcnm-rce.txt",
"URL-https://seclists.org/fulldisclosure/2019/Jul/7"
],
"platform": "",
@ -6343,7 +6343,7 @@
"https"
],
"targets": null,
"mod_time": "2020-10-02 17:38:06 +0000",
"mod_time": "2022-01-13 18:55:39 +0000",
"path": "/modules/auxiliary/admin/networking/cisco_dcnm_download.rb",
"is_install_path": true,
"ref_name": "admin/networking/cisco_dcnm_download",
@ -19557,7 +19557,7 @@
"CVE-2018-17888",
"URL-https://ics-cert.us-cert.gov/advisories/ICSA-18-284-02",
"URL-https://seclists.org/fulldisclosure/2019/Jan/51",
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/nuuo-cms-ownage.txt"
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/NUUO/nuuo-cms-ownage.txt"
],
"platform": "Windows",
"arch": "",
@ -19569,7 +19569,7 @@
],
"targets": null,
"mod_time": "2020-10-02 17:38:06 +0000",
"mod_time": "2022-01-13 18:54:56 +0000",
"path": "/modules/auxiliary/gather/nuuo_cms_bruteforce.rb",
"is_install_path": true,
"ref_name": "gather/nuuo_cms_bruteforce",
@ -19598,7 +19598,7 @@
"CVE-2018-17934",
"URL-https://ics-cert.us-cert.gov/advisories/ICSA-18-284-02",
"URL-https://seclists.org/fulldisclosure/2019/Jan/51",
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/nuuo-cms-ownage.txt"
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/NUUO/nuuo-cms-ownage.txt"
],
"platform": "Windows",
"arch": "",
@ -19610,7 +19610,7 @@
],
"targets": null,
"mod_time": "2020-10-02 17:38:06 +0000",
"mod_time": "2022-01-13 18:54:56 +0000",
"path": "/modules/auxiliary/gather/nuuo_cms_file_download.rb",
"is_install_path": true,
"ref_name": "gather/nuuo_cms_file_download",
@ -57581,7 +57581,7 @@
"references": [
"CVE-2018-15379",
"URL-https://seclists.org/fulldisclosure/2018/Oct/19",
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/cisco-prime-infrastructure.txt",
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/Cisco/cisco-prime-infrastructure.txt",
"URL-https://blogs.securiteam.com/index.php/archives/3723",
"URL-https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-pi-tftp"
],
@ -57606,7 +57606,7 @@
"targets": [
"Cisco Prime Infrastructure < 3.4.1 & 3.3.1 Update 02"
],
"mod_time": "2020-10-02 17:38:06 +0000",
"mod_time": "2022-01-13 18:55:39 +0000",
"path": "/modules/exploits/linux/http/cisco_prime_inf_rce.rb",
"is_install_path": true,
"ref_name": "linux/http/cisco_prime_inf_rce",
@ -57760,7 +57760,7 @@
"URL-https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imcs-ucs-authby",
"URL-https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imcs-ucs-cmdinj",
"URL-FULL_DISC",
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/cisco-ucs-rce.txt"
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/Cisco/cisco-ucs-rce.txt"
],
"platform": "Unix",
"arch": "cmd",
@ -57783,7 +57783,7 @@
"targets": [
"Cisco UCS Director < 6.7.2.0"
],
"mod_time": "2020-10-02 17:38:06 +0000",
"mod_time": "2022-01-13 18:55:39 +0000",
"path": "/modules/exploits/linux/http/cisco_ucs_rce.rb",
"is_install_path": true,
"ref_name": "linux/http/cisco_ucs_rce",
@ -63561,7 +63561,7 @@
"references": [
"CVE-2016-5675",
"US-CERT-VU-856152",
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/nuuo-nvr-vulns.txt",
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/NUUO/nuuo-nvr-vulns.txt",
"URL-https://seclists.org/bugtraq/2016/Aug/45"
],
"platform": "Unix",
@ -63588,7 +63588,7 @@
"ReadyNAS NETGEAR Surveillance",
"NUUO Crystal"
],
"mod_time": "2020-10-02 17:38:06 +0000",
"mod_time": "2022-01-13 18:54:56 +0000",
"path": "/modules/exploits/linux/http/nuuo_nvrmini_auth_rce.rb",
"is_install_path": true,
"ref_name": "linux/http/nuuo_nvrmini_auth_rce",
@ -63616,7 +63616,7 @@
"references": [
"CVE-2016-5674",
"US-CERT-VU-856152",
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/nuuo-nvr-vulns.txt",
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/NUUO/nuuo-nvr-vulns.txt",
"URL-https://seclists.org/bugtraq/2016/Aug/45"
],
"platform": "Unix",
@ -63642,7 +63642,7 @@
"NUUO NVRmini 2",
"ReadyNAS NETGEAR Surveillance"
],
"mod_time": "2020-10-02 17:38:06 +0000",
"mod_time": "2022-01-13 18:54:56 +0000",
"path": "/modules/exploits/linux/http/nuuo_nvrmini_unauth_rce.rb",
"is_install_path": true,
"ref_name": "linux/http/nuuo_nvrmini_unauth_rce",
@ -74074,7 +74074,7 @@
"CVE-2019-1935",
"URL-https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190821-imcs-usercred",
"URL-https://seclists.org/fulldisclosure/2019/Aug/36",
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/cisco-ucs-rce.txt"
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/Cisco/cisco-ucs-rce.txt"
],
"platform": "Unix",
"arch": "cmd",
@ -74088,7 +74088,7 @@
"targets": [
"Cisco UCS Director < 6.7.2.0"
],
"mod_time": "2020-10-02 17:38:06 +0000",
"mod_time": "2022-01-13 18:55:39 +0000",
"path": "/modules/exploits/linux/ssh/cisco_ucs_scpuser.rb",
"is_install_path": true,
"ref_name": "linux/ssh/cisco_ucs_scpuser",
@ -79492,8 +79492,7 @@
"CVE-2019-1622",
"URL-https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190626-dcnm-bypass",
"URL-https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190626-dcnm-codex",
"URL-https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190626-dcnm-codex",
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/exploits/metasploit/cisco_dcnm_upload_2019.rb",
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/Cisco/cisco-dcnm-rce.txt",
"URL-https://seclists.org/fulldisclosure/2019/Jul/7"
],
"platform": "Java",
@ -79520,7 +79519,7 @@
"Cisco DCNM 11.0(1)",
"Cisco DCNM 10.4(2)"
],
"mod_time": "2020-10-02 17:38:06 +0000",
"mod_time": "2022-01-13 18:55:39 +0000",
"path": "/modules/exploits/multi/http/cisco_dcnm_upload_2019.rb",
"is_install_path": true,
"ref_name": "multi/http/cisco_dcnm_upload_2019",
@ -138957,7 +138956,7 @@
"references": [
"CVE-2015-6922",
"ZDI-15-449",
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/kaseya-vsa-vuln-2.txt",
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/Kaseya/kaseya-vsa-vuln-2.txt",
"URL-https://seclists.org/bugtraq/2015/Sep/132"
],
"platform": "Windows",
@ -138981,7 +138980,7 @@
"targets": [
"Kaseya VSA v7 to v9.1"
],
"mod_time": "2020-10-02 17:38:06 +0000",
"mod_time": "2022-01-13 18:47:11 +0000",
"path": "/modules/exploits/windows/http/kaseya_uploader.rb",
"is_install_path": true,
"ref_name": "windows/http/kaseya_uploader",
@ -157058,7 +157057,7 @@
"CVE-2018-17936",
"URL-https://ics-cert.us-cert.gov/advisories/ICSA-18-284-02",
"URL-https://seclists.org/fulldisclosure/2019/Jan/51",
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/nuuo-cms-ownage.txt"
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/NUUO/nuuo-cms-ownage.txt"
],
"platform": "Windows",
"arch": "x86",
@ -157072,7 +157071,7 @@
"targets": [
"Nuuo Central Management Server <= v2.4.0"
],
"mod_time": "2021-09-08 21:56:02 +0000",
"mod_time": "2022-01-13 18:54:56 +0000",
"path": "/modules/exploits/windows/nuuo/nuuo_cms_fu.rb",
"is_install_path": true,
"ref_name": "windows/nuuo/nuuo_cms_fu",
@ -157101,7 +157100,7 @@
"CVE-2018-18982",
"URL-https://ics-cert.us-cert.gov/advisories/ICSA-18-284-02",
"URL-https://seclists.org/fulldisclosure/2019/Jan/51",
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/nuuo-cms-ownage.txt"
"URL-https://raw.githubusercontent.com/pedrib/PoC/master/advisories/NUUO/nuuo-cms-ownage.txt"
],
"platform": "Windows",
"arch": "x86",
@ -157115,7 +157114,7 @@
"targets": [
"Nuuo Central Management Server <= v2.10.0"
],
"mod_time": "2020-10-02 17:38:06 +0000",
"mod_time": "2022-01-13 18:54:56 +0000",
"path": "/modules/exploits/windows/nuuo/nuuo_cms_sqli.rb",
"is_install_path": true,
"ref_name": "windows/nuuo/nuuo_cms_sqli",