automatic module_metadata_base.json update

GSoC/Meterpreter_Web_Console
Metasploit 2018-07-26 22:01:52 -07:00
parent 1bcf2f9b37
commit 590f117337
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 28 additions and 0 deletions

View File

@ -43723,6 +43723,34 @@
"ref_name": "multi/http/wp_ninja_forms_unauthenticated_file_upload",
"check": true
},
"exploit_multi/http/wp_responsive_thumbnail_slider_upload": {
"name": "WordPress Responsive Thumbnail Slider Arbitrary File Upload",
"full_name": "exploit/multi/http/wp_responsive_thumbnail_slider_upload",
"rank": 600,
"disclosure_date": "2015-08-28",
"type": "exploit",
"author": [
"Arash Khazaei",
"Shelby Pace"
],
"description": "This module exploits an arbitrary file upload vulnerability in Responsive Thumbnail Slider\n Plugin v1.0 for WordPress post authentication.",
"references": [
"EDB-37998"
],
"is_server": true,
"is_client": false,
"platform": "PHP",
"arch": "php",
"rport": 80,
"targets": [
"Responsive Thumbnail Slider Plugin v1.0"
],
"mod_time": "2018-07-26 23:08:20 +0000",
"path": "/modules/exploits/multi/http/wp_responsive_thumbnail_slider_upload.rb",
"is_install_path": true,
"ref_name": "multi/http/wp_responsive_thumbnail_slider_upload",
"check": true
},
"exploit_multi/http/x7chat2_php_exec": {
"name": "X7 Chat 2.0.5 lib/message.php preg_replace() PHP Code Execution",
"full_name": "exploit/multi/http/x7chat2_php_exec",