automatic module_metadata_base.json update
This commit is contained in:
parent
8add7fb7ca
commit
5fbe243662
|
@ -65135,50 +65135,6 @@
|
|||
},
|
||||
"needs_cleanup": null
|
||||
},
|
||||
"exploit_linux/misc/drb_remote_codeexec": {
|
||||
"name": "Distributed Ruby Remote Code Execution",
|
||||
"fullname": "exploit/linux/misc/drb_remote_codeexec",
|
||||
"aliases": [
|
||||
|
||||
],
|
||||
"rank": 600,
|
||||
"disclosure_date": "2011-03-23",
|
||||
"type": "exploit",
|
||||
"author": [
|
||||
"joernchen <joernchen@phenoelit.de>"
|
||||
],
|
||||
"description": "This module exploits remote code execution vulnerabilities in dRuby.",
|
||||
"references": [
|
||||
"URL-http://www.ruby-doc.org/stdlib-1.9.3/libdoc/drb/rdoc/DRb.html",
|
||||
"URL-http://blog.recurity-labs.com/archives/2011/05/12/druby_for_penetration_testers/",
|
||||
"URL-http://bugkraut.de/posts/tainting"
|
||||
],
|
||||
"platform": "Unix",
|
||||
"arch": "cmd",
|
||||
"rport": 8787,
|
||||
"autofilter_ports": [
|
||||
|
||||
],
|
||||
"autofilter_services": [
|
||||
|
||||
],
|
||||
"targets": [
|
||||
"Automatic",
|
||||
"Trap",
|
||||
"Eval",
|
||||
"Syscall"
|
||||
],
|
||||
"mod_time": "2020-10-22 12:35:35 +0000",
|
||||
"path": "/modules/exploits/linux/misc/drb_remote_codeexec.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "linux/misc/drb_remote_codeexec",
|
||||
"check": true,
|
||||
"post_auth": false,
|
||||
"default_credential": false,
|
||||
"notes": {
|
||||
},
|
||||
"needs_cleanup": true
|
||||
},
|
||||
"exploit_linux/misc/gld_postfix": {
|
||||
"name": "GLD (Greylisting Daemon) Postfix Buffer Overflow",
|
||||
"fullname": "exploit/linux/misc/gld_postfix",
|
||||
|
|
Loading…
Reference in New Issue