automatic module_metadata_base.json update

This commit is contained in:
Metasploit 2020-11-02 18:38:07 -06:00
parent 8add7fb7ca
commit 5fbe243662
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 0 additions and 44 deletions

View File

@ -65135,50 +65135,6 @@
},
"needs_cleanup": null
},
"exploit_linux/misc/drb_remote_codeexec": {
"name": "Distributed Ruby Remote Code Execution",
"fullname": "exploit/linux/misc/drb_remote_codeexec",
"aliases": [
],
"rank": 600,
"disclosure_date": "2011-03-23",
"type": "exploit",
"author": [
"joernchen <joernchen@phenoelit.de>"
],
"description": "This module exploits remote code execution vulnerabilities in dRuby.",
"references": [
"URL-http://www.ruby-doc.org/stdlib-1.9.3/libdoc/drb/rdoc/DRb.html",
"URL-http://blog.recurity-labs.com/archives/2011/05/12/druby_for_penetration_testers/",
"URL-http://bugkraut.de/posts/tainting"
],
"platform": "Unix",
"arch": "cmd",
"rport": 8787,
"autofilter_ports": [
],
"autofilter_services": [
],
"targets": [
"Automatic",
"Trap",
"Eval",
"Syscall"
],
"mod_time": "2020-10-22 12:35:35 +0000",
"path": "/modules/exploits/linux/misc/drb_remote_codeexec.rb",
"is_install_path": true,
"ref_name": "linux/misc/drb_remote_codeexec",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
},
"needs_cleanup": true
},
"exploit_linux/misc/gld_postfix": {
"name": "GLD (Greylisting Daemon) Postfix Buffer Overflow",
"fullname": "exploit/linux/misc/gld_postfix",