automatic module_metadata_base.json update

GSoC/Meterpreter_Web_Console
Metasploit 2018-07-02 12:07:14 -07:00
parent 2ec091931a
commit 0606f65d90
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 28 additions and 0 deletions

View File

@ -61853,6 +61853,34 @@
"is_install_path": true,
"ref_name": "windows/fileformat/blazedvd_plf"
},
"exploit_windows/fileformat/boxoft_wav_to_mp3": {
"name": "Boxoft WAV to MP3 Converter v1.1 Buffer Overflow",
"full_name": "exploit/windows/fileformat/boxoft_wav_to_mp3",
"rank": 300,
"disclosure_date": "2015-08-31",
"type": "exploit",
"author": [
"Robbie Corley",
"Shelby Pace"
],
"description": "This module exploits a stack buffer overflow in Boxoft WAV to MP3 Converter versions 1.0 and 1.1.\n By constructing a specially crafted WAV file and attempting to convert it to an MP3 file in the\n application, a buffer is overwritten, which allows for running shellcode.",
"references": [
"CVE-2015-7243",
"EDB-38035"
],
"is_server": true,
"is_client": false,
"platform": "Windows",
"arch": "",
"rport": "",
"targets": [
"Boxoft WAV to MP3 Converter v1.1"
],
"mod_time": "2018-07-02 14:00:33 +0000",
"path": "/modules/exploits/windows/fileformat/boxoft_wav_to_mp3.rb",
"is_install_path": true,
"ref_name": "windows/fileformat/boxoft_wav_to_mp3"
},
"exploit_windows/fileformat/bpftp_client_bps_bof": {
"name": "BulletProof FTP Client BPS Buffer Overflow",
"full_name": "exploit/windows/fileformat/bpftp_client_bps_bof",