diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index aea666a3d5..6a7214cc4b 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -65135,50 +65135,6 @@ }, "needs_cleanup": null }, - "exploit_linux/misc/drb_remote_codeexec": { - "name": "Distributed Ruby Remote Code Execution", - "fullname": "exploit/linux/misc/drb_remote_codeexec", - "aliases": [ - - ], - "rank": 600, - "disclosure_date": "2011-03-23", - "type": "exploit", - "author": [ - "joernchen " - ], - "description": "This module exploits remote code execution vulnerabilities in dRuby.", - "references": [ - "URL-http://www.ruby-doc.org/stdlib-1.9.3/libdoc/drb/rdoc/DRb.html", - "URL-http://blog.recurity-labs.com/archives/2011/05/12/druby_for_penetration_testers/", - "URL-http://bugkraut.de/posts/tainting" - ], - "platform": "Unix", - "arch": "cmd", - "rport": 8787, - "autofilter_ports": [ - - ], - "autofilter_services": [ - - ], - "targets": [ - "Automatic", - "Trap", - "Eval", - "Syscall" - ], - "mod_time": "2020-10-22 12:35:35 +0000", - "path": "/modules/exploits/linux/misc/drb_remote_codeexec.rb", - "is_install_path": true, - "ref_name": "linux/misc/drb_remote_codeexec", - "check": true, - "post_auth": false, - "default_credential": false, - "notes": { - }, - "needs_cleanup": true - }, "exploit_linux/misc/gld_postfix": { "name": "GLD (Greylisting Daemon) Postfix Buffer Overflow", "fullname": "exploit/linux/misc/gld_postfix",