automatic module_metadata_base.json update
parent
ae48ba635a
commit
70a45351d7
|
@ -6411,6 +6411,32 @@
|
|||
"ref_name": "dos/scada/igss9_dataserver",
|
||||
"check": false
|
||||
},
|
||||
"auxiliary_dos/scada/siemens_siprotec4": {
|
||||
"name": "Siemens SIPROTEC 4 and SIPROTEC Compact EN100 Ethernet Module - Denial of Service",
|
||||
"full_name": "auxiliary/dos/scada/siemens_siprotec4",
|
||||
"rank": 300,
|
||||
"disclosure_date": null,
|
||||
"type": "auxiliary",
|
||||
"author": [
|
||||
"M. Can Kurnaz"
|
||||
],
|
||||
"description": "This module sends a specially crafted packet to port 50000/UDP\n causing a denial of service of the affected (Siemens SIPROTEC 4 and SIPROTEC Compact < V4.25) devices.\n A manual reboot is required to return the device to service.\n CVE-2015-5374 and a CVSS v2 base score of 7.8 have been assigned to this vulnerability.",
|
||||
"references": [
|
||||
"URL-https://www.exploit-db.com/exploits/44103/",
|
||||
"URL-https://ics-cert.us-cert.gov/advisories/ICSA-15-202-01"
|
||||
],
|
||||
"is_server": false,
|
||||
"is_client": false,
|
||||
"platform": "",
|
||||
"arch": "",
|
||||
"rport": 50000,
|
||||
"targets": null,
|
||||
"mod_time": "2018-03-13 09:30:48 +0000",
|
||||
"path": "/modules/auxiliary/dos/scada/siemens_siprotec4.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "dos/scada/siemens_siprotec4",
|
||||
"check": false
|
||||
},
|
||||
"auxiliary_dos/scada/yokogawa_logsvr": {
|
||||
"name": "Yokogawa CENTUM CS 3000 BKCLogSvr.exe Heap Buffer Overflow",
|
||||
"full_name": "auxiliary/dos/scada/yokogawa_logsvr",
|
||||
|
@ -31171,7 +31197,7 @@
|
|||
"targets": [
|
||||
"Automatic"
|
||||
],
|
||||
"mod_time": "2018-07-12 21:32:09 +0000",
|
||||
"mod_time": "2018-08-03 01:39:37 +0000",
|
||||
"path": "/modules/exploits/linux/http/hadoop_unauth_exec.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "linux/http/hadoop_unauth_exec",
|
||||
|
|
Loading…
Reference in New Issue