automatic module_metadata_base.json update
parent
c45d993644
commit
943629b354
|
@ -80594,6 +80594,35 @@
|
|||
"ref_name": "windows/misc/vmhgfs_webdav_dll_sideload",
|
||||
"check": false
|
||||
},
|
||||
"exploit_windows/misc/weblogic_deserialize": {
|
||||
"name": "Oracle Weblogic Server Deserialization RCE",
|
||||
"full_name": "exploit/windows/misc/weblogic_deserialize",
|
||||
"rank": 0,
|
||||
"disclosure_date": "2018-04-17",
|
||||
"type": "exploit",
|
||||
"author": [
|
||||
"brianwrf",
|
||||
"Jacob Robles"
|
||||
],
|
||||
"description": "An unauthenticated attacker with network access to the Oracle Weblogic\n Server T3 interface can send a serialized object to the interface to\n execute code on vulnerable hosts.",
|
||||
"references": [
|
||||
"CVE-2018-2628",
|
||||
"EDB-44553"
|
||||
],
|
||||
"is_server": false,
|
||||
"is_client": true,
|
||||
"platform": "",
|
||||
"arch": "",
|
||||
"rport": 7001,
|
||||
"targets": [
|
||||
"Windows"
|
||||
],
|
||||
"mod_time": "2018-08-09 14:51:56 +0000",
|
||||
"path": "/modules/exploits/windows/misc/weblogic_deserialize.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "windows/misc/weblogic_deserialize",
|
||||
"check": false
|
||||
},
|
||||
"exploit_windows/misc/windows_rsh": {
|
||||
"name": "Windows RSH Daemon Buffer Overflow",
|
||||
"full_name": "exploit/windows/misc/windows_rsh",
|
||||
|
|
Loading…
Reference in New Issue