automatic module_metadata_base.json update
parent
1bcf2f9b37
commit
590f117337
|
@ -43723,6 +43723,34 @@
|
|||
"ref_name": "multi/http/wp_ninja_forms_unauthenticated_file_upload",
|
||||
"check": true
|
||||
},
|
||||
"exploit_multi/http/wp_responsive_thumbnail_slider_upload": {
|
||||
"name": "WordPress Responsive Thumbnail Slider Arbitrary File Upload",
|
||||
"full_name": "exploit/multi/http/wp_responsive_thumbnail_slider_upload",
|
||||
"rank": 600,
|
||||
"disclosure_date": "2015-08-28",
|
||||
"type": "exploit",
|
||||
"author": [
|
||||
"Arash Khazaei",
|
||||
"Shelby Pace"
|
||||
],
|
||||
"description": "This module exploits an arbitrary file upload vulnerability in Responsive Thumbnail Slider\n Plugin v1.0 for WordPress post authentication.",
|
||||
"references": [
|
||||
"EDB-37998"
|
||||
],
|
||||
"is_server": true,
|
||||
"is_client": false,
|
||||
"platform": "PHP",
|
||||
"arch": "php",
|
||||
"rport": 80,
|
||||
"targets": [
|
||||
"Responsive Thumbnail Slider Plugin v1.0"
|
||||
],
|
||||
"mod_time": "2018-07-26 23:08:20 +0000",
|
||||
"path": "/modules/exploits/multi/http/wp_responsive_thumbnail_slider_upload.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "multi/http/wp_responsive_thumbnail_slider_upload",
|
||||
"check": true
|
||||
},
|
||||
"exploit_multi/http/x7chat2_php_exec": {
|
||||
"name": "X7 Chat 2.0.5 lib/message.php preg_replace() PHP Code Execution",
|
||||
"full_name": "exploit/multi/http/x7chat2_php_exec",
|
||||
|
|
Loading…
Reference in New Issue