automatic module_metadata_base.json update

GSoC/Meterpreter_Web_Console
Metasploit 2018-10-08 08:13:57 -07:00
parent bed497c6ae
commit 06f453e2f3
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 39 additions and 0 deletions

View File

@ -121410,6 +121410,45 @@
"notes": {
}
},
"exploit_windows/scada/delta_ia_commgr_bof": {
"name": "Delta Electronics Delta Industrial Automation COMMGR 1.08 Stack Buffer Overflow",
"full_name": "exploit/windows/scada/delta_ia_commgr_bof",
"rank": 300,
"disclosure_date": "2018-07-02",
"type": "exploit",
"author": [
"t4rkd3vilz",
"hubertwslin"
],
"description": "This module exploits a stack based buffer overflow in Delta Electronics Delta Industrial\n Automation COMMGR 1.08. The vulnerability exists in COMMGR.exe when handling specially\n crafted packets. This module has been tested successfully on Delta Electronics Delta\n Industrial Automation COMMGR 1.08 over\n Windows XP SP3,\n Windows 7 SP1, and\n Windows 8.1.",
"references": [
"EDB-44965",
"CVE-2018-10594"
],
"is_server": true,
"is_client": false,
"platform": "Windows",
"arch": "",
"rport": 502,
"autofilter_ports": [
],
"autofilter_services": [
],
"targets": [
"COMMGR 1.08 / Windows Universal"
],
"mod_time": "2018-09-19 18:19:12 +0000",
"path": "/modules/exploits/windows/scada/delta_ia_commgr_bof.rb",
"is_install_path": true,
"ref_name": "windows/scada/delta_ia_commgr_bof",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
}
},
"exploit_windows/scada/factorylink_csservice": {
"name": "Siemens FactoryLink 8 CSService Logging Path Param Buffer Overflow",
"full_name": "exploit/windows/scada/factorylink_csservice",