automatic module_metadata_base.json update

GSoC/Meterpreter_Web_Console
Metasploit 2018-08-30 04:20:03 -07:00
parent 9d3e1c1942
commit ad4266fb4e
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 32 additions and 31 deletions

View File

@ -48351,6 +48351,38 @@
"post_auth": true,
"default_credential": false
},
"exploit_multi/misc/weblogic_deserialize": {
"name": "Oracle Weblogic Server Deserialization RCE",
"full_name": "exploit/multi/misc/weblogic_deserialize",
"rank": 0,
"disclosure_date": "2018-04-17",
"type": "exploit",
"author": [
"brianwrf",
"Jacob Robles"
],
"description": "An unauthenticated attacker with network access to the Oracle Weblogic\n Server T3 interface can send a serialized object to the interface to\n execute code on vulnerable hosts.",
"references": [
"CVE-2018-2628",
"EDB-44553"
],
"is_server": false,
"is_client": true,
"platform": "",
"arch": "",
"rport": 7001,
"targets": [
"Unix",
"Windows"
],
"mod_time": "2018-08-29 14:56:31 +0000",
"path": "/modules/exploits/multi/misc/weblogic_deserialize.rb",
"is_install_path": true,
"ref_name": "multi/misc/weblogic_deserialize",
"check": true,
"post_auth": false,
"default_credential": false
},
"exploit_multi/misc/wireshark_lwres_getaddrbyname": {
"name": "Wireshark LWRES Dissector getaddrsbyname_request Buffer Overflow",
"full_name": "exploit/multi/misc/wireshark_lwres_getaddrbyname",
@ -86299,37 +86331,6 @@
"post_auth": false,
"default_credential": false
},
"exploit_windows/misc/weblogic_deserialize": {
"name": "Oracle Weblogic Server Deserialization RCE",
"full_name": "exploit/windows/misc/weblogic_deserialize",
"rank": 0,
"disclosure_date": "2018-04-17",
"type": "exploit",
"author": [
"brianwrf",
"Jacob Robles"
],
"description": "An unauthenticated attacker with network access to the Oracle Weblogic\n Server T3 interface can send a serialized object to the interface to\n execute code on vulnerable hosts.",
"references": [
"CVE-2018-2628",
"EDB-44553"
],
"is_server": false,
"is_client": true,
"platform": "",
"arch": "",
"rport": 7001,
"targets": [
"Windows"
],
"mod_time": "2018-08-09 14:51:56 +0000",
"path": "/modules/exploits/windows/misc/weblogic_deserialize.rb",
"is_install_path": true,
"ref_name": "windows/misc/weblogic_deserialize",
"check": false,
"post_auth": false,
"default_credential": false
},
"exploit_windows/misc/windows_rsh": {
"name": "Windows RSH Daemon Buffer Overflow",
"full_name": "exploit/windows/misc/windows_rsh",