automatic module_metadata_base.json update

GSoC/Meterpreter_Web_Console
Metasploit 2019-02-22 16:13:04 -08:00
parent fec109a6d3
commit aa0ba91d92
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 4 additions and 4 deletions

View File

@ -31852,7 +31852,7 @@
"author": [
"Deral \"Percentx\" Heiland",
"Pete \"Bokojan\" Arzamendi",
"William Vu",
"wvu <wvu@metasploit.com>",
"Dev Mohanty"
],
"description": "This module will extract the passwords from address books on various Canon IR-Adv mfp devices.\n Tested models:\n iR-ADV C2030,\n iR-ADV 4045,\n iR-ADV C5030,\n iR-ADV C5235,\n iR-ADV C5240,\n iR-ADV 6055,\n iR-ADV C7065",
@ -31878,7 +31878,7 @@
"https"
],
"targets": null,
"mod_time": "2017-07-24 06:26:21 +0000",
"mod_time": "2019-02-22 17:01:49 +0000",
"path": "/modules/auxiliary/scanner/printer/canon_iradv_pwd_extract.rb",
"is_install_path": true,
"ref_name": "scanner/printer/canon_iradv_pwd_extract",
@ -53515,7 +53515,7 @@
"Steve Breen",
"Dev Mohanty",
"Louis Sato",
"William Vu",
"wvu <wvu@metasploit.com>",
"juan vazquez <juan.vazquez@metasploit.com>",
"Wei Chen"
],
@ -53539,7 +53539,7 @@
"targets": [
"Jenkins 1.637"
],
"mod_time": "2017-07-24 06:26:21 +0000",
"mod_time": "2019-02-22 17:01:49 +0000",
"path": "/modules/exploits/linux/misc/jenkins_java_deserialize.rb",
"is_install_path": true,
"ref_name": "linux/misc/jenkins_java_deserialize",