automatic module_metadata_base.json update

GSoC/Meterpreter_Web_Console
Metasploit 2018-08-04 05:41:15 -07:00
parent ae48ba635a
commit 70a45351d7
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 27 additions and 1 deletions

View File

@ -6411,6 +6411,32 @@
"ref_name": "dos/scada/igss9_dataserver",
"check": false
},
"auxiliary_dos/scada/siemens_siprotec4": {
"name": "Siemens SIPROTEC 4 and SIPROTEC Compact EN100 Ethernet Module - Denial of Service",
"full_name": "auxiliary/dos/scada/siemens_siprotec4",
"rank": 300,
"disclosure_date": null,
"type": "auxiliary",
"author": [
"M. Can Kurnaz"
],
"description": "This module sends a specially crafted packet to port 50000/UDP\n causing a denial of service of the affected (Siemens SIPROTEC 4 and SIPROTEC Compact < V4.25) devices.\n A manual reboot is required to return the device to service.\n CVE-2015-5374 and a CVSS v2 base score of 7.8 have been assigned to this vulnerability.",
"references": [
"URL-https://www.exploit-db.com/exploits/44103/",
"URL-https://ics-cert.us-cert.gov/advisories/ICSA-15-202-01"
],
"is_server": false,
"is_client": false,
"platform": "",
"arch": "",
"rport": 50000,
"targets": null,
"mod_time": "2018-03-13 09:30:48 +0000",
"path": "/modules/auxiliary/dos/scada/siemens_siprotec4.rb",
"is_install_path": true,
"ref_name": "dos/scada/siemens_siprotec4",
"check": false
},
"auxiliary_dos/scada/yokogawa_logsvr": {
"name": "Yokogawa CENTUM CS 3000 BKCLogSvr.exe Heap Buffer Overflow",
"full_name": "auxiliary/dos/scada/yokogawa_logsvr",
@ -31171,7 +31197,7 @@
"targets": [
"Automatic"
],
"mod_time": "2018-07-12 21:32:09 +0000",
"mod_time": "2018-08-03 01:39:37 +0000",
"path": "/modules/exploits/linux/http/hadoop_unauth_exec.rb",
"is_install_path": true,
"ref_name": "linux/http/hadoop_unauth_exec",