automatic module_metadata_base.json update
parent
b5fb970aec
commit
ac20372d00
|
@ -35408,6 +35408,39 @@
|
|||
"is_install_path": true,
|
||||
"ref_name": "linux/misc/gld_postfix"
|
||||
},
|
||||
"exploit_linux/misc/hid_discoveryd_command_blink_on_unauth_rce": {
|
||||
"name": "HID discoveryd command_blink_on Unauthenticated RCE",
|
||||
"full_name": "exploit/linux/misc/hid_discoveryd_command_blink_on_unauth_rce",
|
||||
"rank": 600,
|
||||
"disclosure_date": "2016-03-28",
|
||||
"type": "exploit",
|
||||
"author": [
|
||||
"Ricky \"HeadlessZeke\" Lawshae",
|
||||
"coldfusion39",
|
||||
"Brendan Coles"
|
||||
],
|
||||
"description": "This module exploits an unauthenticated remote command execution\n vulnerability in the discoveryd service exposed by HID VertX and Edge\n door controllers.\n\n This module was tested successfully on a HID Edge model EH400\n with firmware version 2.3.1.603 (Build 04/23/2012).",
|
||||
"references": [
|
||||
"ZDI-16-223",
|
||||
"URL-https://blog.trendmicro.com/let-get-door-remote-root-vulnerability-hid-door-controllers/",
|
||||
"URL-http://nosedookie.blogspot.com/2011/07/identifying-and-querying-hid-vertx.html",
|
||||
"URL-https://exfil.co/2016/05/09/exploring-the-hid-eh400/",
|
||||
"URL-https://github.com/lixmk/Concierge",
|
||||
"URL-https://github.com/coldfusion39/VertXploit"
|
||||
],
|
||||
"is_server": false,
|
||||
"is_client": false,
|
||||
"platform": "Linux",
|
||||
"arch": "armle",
|
||||
"rport": "4070",
|
||||
"targets": [
|
||||
"Automatic"
|
||||
],
|
||||
"mod_time": "2018-06-03 05:41:10 +0000",
|
||||
"path": "/modules/exploits/linux/misc/hid_discoveryd_command_blink_on_unauth_rce.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "linux/misc/hid_discoveryd_command_blink_on_unauth_rce"
|
||||
},
|
||||
"exploit_linux/misc/hikvision_rtsp_bof": {
|
||||
"name": "Hikvision DVR RTSP Request Remote Code Execution",
|
||||
"full_name": "exploit/linux/misc/hikvision_rtsp_bof",
|
||||
|
@ -39745,6 +39778,34 @@
|
|||
"is_install_path": true,
|
||||
"ref_name": "multi/http/gitlab_shell_exec"
|
||||
},
|
||||
"exploit_multi/http/gitlist_arg_injection": {
|
||||
"name": "GitList v0.6.0 Argument Injection Vulnerability",
|
||||
"full_name": "exploit/multi/http/gitlist_arg_injection",
|
||||
"rank": 600,
|
||||
"disclosure_date": "2018-04-26",
|
||||
"type": "exploit",
|
||||
"author": [
|
||||
"Kacper Szurek",
|
||||
"Shelby Pace"
|
||||
],
|
||||
"description": "This module exploits an argument injection vulnerability in GitList v0.6.0.\n The vulnerability arises from GitList improperly validating input using the php function\n 'escapeshellarg'.",
|
||||
"references": [
|
||||
"EDB-44548",
|
||||
"URL-https://security.szurek.pl/exploit-bypass-php-escapeshellarg-escapeshellcmd.html"
|
||||
],
|
||||
"is_server": true,
|
||||
"is_client": false,
|
||||
"platform": "PHP",
|
||||
"arch": "php",
|
||||
"rport": "80",
|
||||
"targets": [
|
||||
"GitList v0.6.0"
|
||||
],
|
||||
"mod_time": "2018-07-06 14:25:58 +0000",
|
||||
"path": "/modules/exploits/multi/http/gitlist_arg_injection.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "multi/http/gitlist_arg_injection"
|
||||
},
|
||||
"exploit_multi/http/gitorious_graph": {
|
||||
"name": "Gitorious Arbitrary Command Execution",
|
||||
"full_name": "exploit/multi/http/gitorious_graph",
|
||||
|
@ -101138,7 +101199,9 @@
|
|||
"platform": "Linux,OSX,Windows",
|
||||
"arch": "",
|
||||
"rport": "",
|
||||
"targets": null,
|
||||
"targets": [
|
||||
|
||||
],
|
||||
"mod_time": "2018-06-21 16:46:15 +0000",
|
||||
"path": "/modules/post/multi/manage/open.rb",
|
||||
"is_install_path": true,
|
||||
|
@ -101214,7 +101277,9 @@
|
|||
"platform": "Linux,OSX,Windows",
|
||||
"arch": "",
|
||||
"rport": "",
|
||||
"targets": null,
|
||||
"targets": [
|
||||
|
||||
],
|
||||
"mod_time": "2018-06-21 16:46:00 +0000",
|
||||
"path": "/modules/post/multi/manage/screensaver.rb",
|
||||
"is_install_path": true,
|
||||
|
|
Loading…
Reference in New Issue