automatic module_metadata_base.json update

This commit is contained in:
Metasploit 2018-08-29 09:24:52 -07:00
parent 468613f688
commit b5b06f0fb0
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 12 additions and 12 deletions

View File

@ -6231,7 +6231,7 @@
"references": [
"CVE-2007-6750",
"CVE-2010-2227",
"URL-https://www.exploit-db.com/exploits/8976/",
"EDB-8976",
"URL-https://github.com/gkbrk/slowloris"
],
"is_server": false,
@ -6240,7 +6240,7 @@
"arch": "",
"rport": 80,
"targets": null,
"mod_time": "2018-03-07 17:06:04 +0000",
"mod_time": "2018-08-28 13:49:31 +0000",
"path": "/modules/auxiliary/dos/http/slowloris.py",
"is_install_path": true,
"ref_name": "dos/http/slowloris",
@ -6946,7 +6946,7 @@
],
"description": "This module sends a specially crafted packet to port 50000/UDP\n causing a denial of service of the affected (Siemens SIPROTEC 4 and SIPROTEC Compact < V4.25) devices.\n A manual reboot is required to return the device to service.\n CVE-2015-5374 and a CVSS v2 base score of 7.8 have been assigned to this vulnerability.",
"references": [
"URL-https://www.exploit-db.com/exploits/44103/",
"EDB-44103",
"URL-https://ics-cert.us-cert.gov/advisories/ICSA-15-202-01"
],
"is_server": false,
@ -6955,7 +6955,7 @@
"arch": "",
"rport": 50000,
"targets": null,
"mod_time": "2018-03-13 09:30:48 +0000",
"mod_time": "2018-08-28 13:12:43 +0000",
"path": "/modules/auxiliary/dos/scada/siemens_siprotec4.rb",
"is_install_path": true,
"ref_name": "dos/scada/siemens_siprotec4",
@ -7212,7 +7212,7 @@
"description": "Claymores Dual GPU Miner 10.5 and below is vulnerable to a format strings vulnerability. This allows an\n unauthenticated attacker to read memory addresses, or immediately terminate the mining process causing\n a denial of service.",
"references": [
"CVE-2018-6317",
"URL-https://www.exploit-db.com/exploits/43972/",
"EDB-43972",
"URL-https://github.com/nanopool/Claymore-Dual-Miner"
],
"is_server": false,
@ -7221,7 +7221,7 @@
"arch": "",
"rport": 3333,
"targets": null,
"mod_time": "2018-08-28 13:34:02 +0000",
"mod_time": "2018-08-29 06:09:40 +0000",
"path": "/modules/auxiliary/dos/tcp/claymore_dos.py",
"is_install_path": true,
"ref_name": "dos/tcp/claymore_dos",
@ -34618,7 +34618,7 @@
"references": [
"EDB-40889",
"URL-http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=305",
"URL-https://www.kb.cert.org/vuls/id/582384",
"US-CERT-VU-582384",
"URL-http://kb.netgear.com/000036386/CVE-2016-582384",
"CVE-2016-6277"
],
@ -34630,7 +34630,7 @@
"targets": [
"Automatic Target"
],
"mod_time": "2017-07-24 06:26:21 +0000",
"mod_time": "2018-08-28 13:12:43 +0000",
"path": "/modules/exploits/linux/http/netgear_r7000_cgibin_exec.rb",
"is_install_path": true,
"ref_name": "linux/http/netgear_r7000_cgibin_exec",
@ -84611,7 +84611,7 @@
"CVE-2017-5816",
"EDB-43198",
"ZDI-17-340",
"URL-https://www.securityfocus.com/bid/98469/info",
"BID-98469",
"URL-https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03745en_us"
],
"is_server": true,
@ -84622,7 +84622,7 @@
"targets": [
"Automatic"
],
"mod_time": "2018-01-05 11:28:14 +0000",
"mod_time": "2018-08-28 13:12:43 +0000",
"path": "/modules/exploits/windows/misc/hp_imc_dbman_restartdb_unauth_rce.rb",
"is_install_path": true,
"ref_name": "windows/misc/hp_imc_dbman_restartdb_unauth_rce",
@ -84646,7 +84646,7 @@
"CVE-2017-5817",
"EDB-43195",
"ZDI-17-341",
"URL-https://www.securityfocus.com/bid/98469/info",
"BID-98469",
"URL-https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03745en_us"
],
"is_server": true,
@ -84657,7 +84657,7 @@
"targets": [
"Automatic"
],
"mod_time": "2018-01-05 11:28:48 +0000",
"mod_time": "2018-08-28 13:12:43 +0000",
"path": "/modules/exploits/windows/misc/hp_imc_dbman_restoredbase_unauth_rce.rb",
"is_install_path": true,
"ref_name": "windows/misc/hp_imc_dbman_restoredbase_unauth_rce",