automatic module_metadata_base.json update

GSoC/Meterpreter_Web_Console
Metasploit 2019-02-09 03:11:58 -08:00
parent f589db6831
commit bfdc4056d2
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 43 additions and 0 deletions

View File

@ -72244,6 +72244,49 @@
"notes": {
}
},
"exploit_osx/browser/adobe_flash_delete_range_tl_op": {
"name": "Adobe Flash Player DeleteRangeTimelineOperation Type-Confusion",
"full_name": "exploit/osx/browser/adobe_flash_delete_range_tl_op",
"rank": 500,
"disclosure_date": "2016-04-27",
"type": "exploit",
"author": [
"Genwei Jiang",
"bcook-r7"
],
"description": "This module exploits a type confusion on Adobe Flash Player, which was\n originally found being successfully exploited in the wild. This module\n has been tested successfully on:\n macOS Sierra 10.12.3,\n Safari and Adobe Flash Player 21.0.0.182,\n Firefox and Adobe Flash Player 21.0.0.182.",
"references": [
"CVE-2016-4117",
"BID-90505",
"URL-https://www.fireeye.com/blog/threat-research/2016/05/cve-2016-4117-flash-zero-day.html",
"URL-http://www.securitytracker.com/id/1035826",
"URL-https://helpx.adobe.com/security/products/flash-player/apsa16-02.html",
"URL-https://helpx.adobe.com/security/products/flash-player/apsb16-15.html"
],
"is_server": false,
"is_client": true,
"platform": "OSX",
"arch": "",
"rport": null,
"autofilter_ports": [
],
"autofilter_services": [
],
"targets": [
"Mac OS X"
],
"mod_time": "2019-02-09 18:46:35 +0000",
"path": "/modules/exploits/osx/browser/adobe_flash_delete_range_tl_op.rb",
"is_install_path": true,
"ref_name": "osx/browser/adobe_flash_delete_range_tl_op",
"check": false,
"post_auth": false,
"default_credential": false,
"notes": {
}
},
"exploit_osx/browser/mozilla_mchannel": {
"name": "Mozilla Firefox 3.6.16 mChannel Use-After-Free",
"full_name": "exploit/osx/browser/mozilla_mchannel",