automatic module_metadata_base.json update

GSoC/Meterpreter_Web_Console
Metasploit 2018-10-18 21:08:13 -07:00
parent c26d1c93e4
commit af63663779
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 47 additions and 0 deletions

View File

@ -113945,6 +113945,53 @@
"notes": {
}
},
"exploit_windows/local/ms18_8120_win32k_privesc": {
"name": "Windows SetImeInfoEx Win32k NULL Pointer Dereference",
"full_name": "exploit/windows/local/ms18_8120_win32k_privesc",
"rank": 400,
"disclosure_date": "2018-05-09",
"type": "exploit",
"author": [
"unamer",
"bigric3",
"Anton Cherepanov",
"Dhiraj Mishra <dhiraj@notsosecure.com>"
],
"description": "This module exploits elevation of privilege vulnerability that exists in Windows 7 and 2008 R2\n when the Win32k component fails to properly handle objects in memory. An attacker who\n successfully exploited this vulnerability could run arbitrary code in kernel mode. An\n attacker could then install programs; view, change, or delete data; or create new\n accounts with full user rights.\n\n This module is tested against windows 7 x86, windows 7 x64 and windows server 2008 R2 standard x64.",
"references": [
"BID-104034",
"CVE-2018-8120",
"URL-https://github.com/unamer/CVE-2018-8120",
"URL-https://github.com/bigric3/cve-2018-8120",
"URL-http://bigric3.blogspot.com/2018/05/cve-2018-8120-analysis-and-exploit.html",
"URL-https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8120"
],
"is_server": true,
"is_client": false,
"platform": "Windows",
"arch": "",
"rport": null,
"autofilter_ports": [
],
"autofilter_services": [
],
"targets": [
"Automatic",
"Windows 7 x64",
"Windows 7 x86"
],
"mod_time": "2018-10-18 14:30:20 +0000",
"path": "/modules/exploits/windows/local/ms18_8120_win32k_privesc.rb",
"is_install_path": true,
"ref_name": "windows/local/ms18_8120_win32k_privesc",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
}
},
"exploit_windows/local/ms_ndproxy": {
"name": "MS14-002 Microsoft Windows ndproxy.sys Local Privilege Escalation",
"full_name": "exploit/windows/local/ms_ndproxy",