automatic module_metadata_base.json update
parent
9d3e1c1942
commit
ad4266fb4e
|
@ -48351,6 +48351,38 @@
|
|||
"post_auth": true,
|
||||
"default_credential": false
|
||||
},
|
||||
"exploit_multi/misc/weblogic_deserialize": {
|
||||
"name": "Oracle Weblogic Server Deserialization RCE",
|
||||
"full_name": "exploit/multi/misc/weblogic_deserialize",
|
||||
"rank": 0,
|
||||
"disclosure_date": "2018-04-17",
|
||||
"type": "exploit",
|
||||
"author": [
|
||||
"brianwrf",
|
||||
"Jacob Robles"
|
||||
],
|
||||
"description": "An unauthenticated attacker with network access to the Oracle Weblogic\n Server T3 interface can send a serialized object to the interface to\n execute code on vulnerable hosts.",
|
||||
"references": [
|
||||
"CVE-2018-2628",
|
||||
"EDB-44553"
|
||||
],
|
||||
"is_server": false,
|
||||
"is_client": true,
|
||||
"platform": "",
|
||||
"arch": "",
|
||||
"rport": 7001,
|
||||
"targets": [
|
||||
"Unix",
|
||||
"Windows"
|
||||
],
|
||||
"mod_time": "2018-08-29 14:56:31 +0000",
|
||||
"path": "/modules/exploits/multi/misc/weblogic_deserialize.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "multi/misc/weblogic_deserialize",
|
||||
"check": true,
|
||||
"post_auth": false,
|
||||
"default_credential": false
|
||||
},
|
||||
"exploit_multi/misc/wireshark_lwres_getaddrbyname": {
|
||||
"name": "Wireshark LWRES Dissector getaddrsbyname_request Buffer Overflow",
|
||||
"full_name": "exploit/multi/misc/wireshark_lwres_getaddrbyname",
|
||||
|
@ -86299,37 +86331,6 @@
|
|||
"post_auth": false,
|
||||
"default_credential": false
|
||||
},
|
||||
"exploit_windows/misc/weblogic_deserialize": {
|
||||
"name": "Oracle Weblogic Server Deserialization RCE",
|
||||
"full_name": "exploit/windows/misc/weblogic_deserialize",
|
||||
"rank": 0,
|
||||
"disclosure_date": "2018-04-17",
|
||||
"type": "exploit",
|
||||
"author": [
|
||||
"brianwrf",
|
||||
"Jacob Robles"
|
||||
],
|
||||
"description": "An unauthenticated attacker with network access to the Oracle Weblogic\n Server T3 interface can send a serialized object to the interface to\n execute code on vulnerable hosts.",
|
||||
"references": [
|
||||
"CVE-2018-2628",
|
||||
"EDB-44553"
|
||||
],
|
||||
"is_server": false,
|
||||
"is_client": true,
|
||||
"platform": "",
|
||||
"arch": "",
|
||||
"rport": 7001,
|
||||
"targets": [
|
||||
"Windows"
|
||||
],
|
||||
"mod_time": "2018-08-09 14:51:56 +0000",
|
||||
"path": "/modules/exploits/windows/misc/weblogic_deserialize.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "windows/misc/weblogic_deserialize",
|
||||
"check": false,
|
||||
"post_auth": false,
|
||||
"default_credential": false
|
||||
},
|
||||
"exploit_windows/misc/windows_rsh": {
|
||||
"name": "Windows RSH Daemon Buffer Overflow",
|
||||
"full_name": "exploit/windows/misc/windows_rsh",
|
||||
|
|
Loading…
Reference in New Issue