automatic module_metadata_base.json update
parent
bed497c6ae
commit
06f453e2f3
|
@ -121410,6 +121410,45 @@
|
|||
"notes": {
|
||||
}
|
||||
},
|
||||
"exploit_windows/scada/delta_ia_commgr_bof": {
|
||||
"name": "Delta Electronics Delta Industrial Automation COMMGR 1.08 Stack Buffer Overflow",
|
||||
"full_name": "exploit/windows/scada/delta_ia_commgr_bof",
|
||||
"rank": 300,
|
||||
"disclosure_date": "2018-07-02",
|
||||
"type": "exploit",
|
||||
"author": [
|
||||
"t4rkd3vilz",
|
||||
"hubertwslin"
|
||||
],
|
||||
"description": "This module exploits a stack based buffer overflow in Delta Electronics Delta Industrial\n Automation COMMGR 1.08. The vulnerability exists in COMMGR.exe when handling specially\n crafted packets. This module has been tested successfully on Delta Electronics Delta\n Industrial Automation COMMGR 1.08 over\n Windows XP SP3,\n Windows 7 SP1, and\n Windows 8.1.",
|
||||
"references": [
|
||||
"EDB-44965",
|
||||
"CVE-2018-10594"
|
||||
],
|
||||
"is_server": true,
|
||||
"is_client": false,
|
||||
"platform": "Windows",
|
||||
"arch": "",
|
||||
"rport": 502,
|
||||
"autofilter_ports": [
|
||||
|
||||
],
|
||||
"autofilter_services": [
|
||||
|
||||
],
|
||||
"targets": [
|
||||
"COMMGR 1.08 / Windows Universal"
|
||||
],
|
||||
"mod_time": "2018-09-19 18:19:12 +0000",
|
||||
"path": "/modules/exploits/windows/scada/delta_ia_commgr_bof.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "windows/scada/delta_ia_commgr_bof",
|
||||
"check": false,
|
||||
"post_auth": false,
|
||||
"default_credential": false,
|
||||
"notes": {
|
||||
}
|
||||
},
|
||||
"exploit_windows/scada/factorylink_csservice": {
|
||||
"name": "Siemens FactoryLink 8 CSService Logging Path Param Buffer Overflow",
|
||||
"full_name": "exploit/windows/scada/factorylink_csservice",
|
||||
|
|
Loading…
Reference in New Issue