automatic module_metadata_base.json update
parent
468613f688
commit
b5b06f0fb0
|
@ -6231,7 +6231,7 @@
|
|||
"references": [
|
||||
"CVE-2007-6750",
|
||||
"CVE-2010-2227",
|
||||
"URL-https://www.exploit-db.com/exploits/8976/",
|
||||
"EDB-8976",
|
||||
"URL-https://github.com/gkbrk/slowloris"
|
||||
],
|
||||
"is_server": false,
|
||||
|
@ -6240,7 +6240,7 @@
|
|||
"arch": "",
|
||||
"rport": 80,
|
||||
"targets": null,
|
||||
"mod_time": "2018-03-07 17:06:04 +0000",
|
||||
"mod_time": "2018-08-28 13:49:31 +0000",
|
||||
"path": "/modules/auxiliary/dos/http/slowloris.py",
|
||||
"is_install_path": true,
|
||||
"ref_name": "dos/http/slowloris",
|
||||
|
@ -6946,7 +6946,7 @@
|
|||
],
|
||||
"description": "This module sends a specially crafted packet to port 50000/UDP\n causing a denial of service of the affected (Siemens SIPROTEC 4 and SIPROTEC Compact < V4.25) devices.\n A manual reboot is required to return the device to service.\n CVE-2015-5374 and a CVSS v2 base score of 7.8 have been assigned to this vulnerability.",
|
||||
"references": [
|
||||
"URL-https://www.exploit-db.com/exploits/44103/",
|
||||
"EDB-44103",
|
||||
"URL-https://ics-cert.us-cert.gov/advisories/ICSA-15-202-01"
|
||||
],
|
||||
"is_server": false,
|
||||
|
@ -6955,7 +6955,7 @@
|
|||
"arch": "",
|
||||
"rport": 50000,
|
||||
"targets": null,
|
||||
"mod_time": "2018-03-13 09:30:48 +0000",
|
||||
"mod_time": "2018-08-28 13:12:43 +0000",
|
||||
"path": "/modules/auxiliary/dos/scada/siemens_siprotec4.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "dos/scada/siemens_siprotec4",
|
||||
|
@ -7212,7 +7212,7 @@
|
|||
"description": "Claymore’s Dual GPU Miner 10.5 and below is vulnerable to a format strings vulnerability. This allows an\n unauthenticated attacker to read memory addresses, or immediately terminate the mining process causing\n a denial of service.",
|
||||
"references": [
|
||||
"CVE-2018-6317",
|
||||
"URL-https://www.exploit-db.com/exploits/43972/",
|
||||
"EDB-43972",
|
||||
"URL-https://github.com/nanopool/Claymore-Dual-Miner"
|
||||
],
|
||||
"is_server": false,
|
||||
|
@ -7221,7 +7221,7 @@
|
|||
"arch": "",
|
||||
"rport": 3333,
|
||||
"targets": null,
|
||||
"mod_time": "2018-08-28 13:34:02 +0000",
|
||||
"mod_time": "2018-08-29 06:09:40 +0000",
|
||||
"path": "/modules/auxiliary/dos/tcp/claymore_dos.py",
|
||||
"is_install_path": true,
|
||||
"ref_name": "dos/tcp/claymore_dos",
|
||||
|
@ -34618,7 +34618,7 @@
|
|||
"references": [
|
||||
"EDB-40889",
|
||||
"URL-http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=305",
|
||||
"URL-https://www.kb.cert.org/vuls/id/582384",
|
||||
"US-CERT-VU-582384",
|
||||
"URL-http://kb.netgear.com/000036386/CVE-2016-582384",
|
||||
"CVE-2016-6277"
|
||||
],
|
||||
|
@ -34630,7 +34630,7 @@
|
|||
"targets": [
|
||||
"Automatic Target"
|
||||
],
|
||||
"mod_time": "2017-07-24 06:26:21 +0000",
|
||||
"mod_time": "2018-08-28 13:12:43 +0000",
|
||||
"path": "/modules/exploits/linux/http/netgear_r7000_cgibin_exec.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "linux/http/netgear_r7000_cgibin_exec",
|
||||
|
@ -84611,7 +84611,7 @@
|
|||
"CVE-2017-5816",
|
||||
"EDB-43198",
|
||||
"ZDI-17-340",
|
||||
"URL-https://www.securityfocus.com/bid/98469/info",
|
||||
"BID-98469",
|
||||
"URL-https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03745en_us"
|
||||
],
|
||||
"is_server": true,
|
||||
|
@ -84622,7 +84622,7 @@
|
|||
"targets": [
|
||||
"Automatic"
|
||||
],
|
||||
"mod_time": "2018-01-05 11:28:14 +0000",
|
||||
"mod_time": "2018-08-28 13:12:43 +0000",
|
||||
"path": "/modules/exploits/windows/misc/hp_imc_dbman_restartdb_unauth_rce.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "windows/misc/hp_imc_dbman_restartdb_unauth_rce",
|
||||
|
@ -84646,7 +84646,7 @@
|
|||
"CVE-2017-5817",
|
||||
"EDB-43195",
|
||||
"ZDI-17-341",
|
||||
"URL-https://www.securityfocus.com/bid/98469/info",
|
||||
"BID-98469",
|
||||
"URL-https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03745en_us"
|
||||
],
|
||||
"is_server": true,
|
||||
|
@ -84657,7 +84657,7 @@
|
|||
"targets": [
|
||||
"Automatic"
|
||||
],
|
||||
"mod_time": "2018-01-05 11:28:48 +0000",
|
||||
"mod_time": "2018-08-28 13:12:43 +0000",
|
||||
"path": "/modules/exploits/windows/misc/hp_imc_dbman_restoredbase_unauth_rce.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "windows/misc/hp_imc_dbman_restoredbase_unauth_rce",
|
||||
|
|
Loading…
Reference in New Issue