automatic module_metadata_base.json update
parent
c8bbd1c4d7
commit
7868db7b15
|
@ -52093,6 +52093,41 @@
|
|||
"notes": {
|
||||
}
|
||||
},
|
||||
"exploit_linux/local/apt_package_manager_persistence": {
|
||||
"name": "APT Package Manager Persistence",
|
||||
"full_name": "exploit/linux/local/apt_package_manager_persistence",
|
||||
"rank": 600,
|
||||
"disclosure_date": "1999-03-09",
|
||||
"type": "exploit",
|
||||
"author": [
|
||||
"Aaron Ringo"
|
||||
],
|
||||
"description": "This module will run a payload when the package manager is used. No\n handler is ran automatically so you must configure an appropriate\n exploit/multi/handler to connect. This module creates a pre-invoke hook\n for APT in apt.conf.d. The hook name syntax is numeric followed by text.",
|
||||
"references": [
|
||||
|
||||
],
|
||||
"platform": "Linux,Unix",
|
||||
"arch": "cmd, x86, x64, armle, aarch64, ppc, mipsle, mipsbe",
|
||||
"rport": null,
|
||||
"autofilter_ports": [
|
||||
|
||||
],
|
||||
"autofilter_services": [
|
||||
|
||||
],
|
||||
"targets": [
|
||||
"Automatic"
|
||||
],
|
||||
"mod_time": "2019-04-26 13:11:40 +0000",
|
||||
"path": "/modules/exploits/linux/local/apt_package_manager_persistence.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "linux/local/apt_package_manager_persistence",
|
||||
"check": false,
|
||||
"post_auth": false,
|
||||
"default_credential": false,
|
||||
"notes": {
|
||||
}
|
||||
},
|
||||
"exploit_linux/local/asan_suid_executable_priv_esc": {
|
||||
"name": "AddressSanitizer (ASan) SUID Executable Privilege Escalation",
|
||||
"full_name": "exploit/linux/local/asan_suid_executable_priv_esc",
|
||||
|
|
Loading…
Reference in New Issue