automatic module_metadata_base.json update
parent
6dbecac2e9
commit
e3aa147fd2
|
@ -68597,6 +68597,45 @@
|
|||
"notes": {
|
||||
}
|
||||
},
|
||||
"exploit_multi/misc/weblogic_deserialize_unicastref": {
|
||||
"name": "Oracle Weblogic Server Deserialization RCE - RMI UnicastRef",
|
||||
"full_name": "exploit/multi/misc/weblogic_deserialize_unicastref",
|
||||
"rank": 600,
|
||||
"disclosure_date": "2017-01-25",
|
||||
"type": "exploit",
|
||||
"author": [
|
||||
"Andres Rodriguez",
|
||||
"Jacob Baines",
|
||||
"Aaron Soto"
|
||||
],
|
||||
"description": "An unauthenticated attacker with network access to the Oracle Weblogic Server T3\n interface can send a serialized object (sun.rmi.server.UnicastRef)\n to the interface to execute code on vulnerable hosts.",
|
||||
"references": [
|
||||
"CVE-2017-3248"
|
||||
],
|
||||
"platform": "Solaris,Unix,Windows",
|
||||
"arch": "",
|
||||
"rport": 7001,
|
||||
"autofilter_ports": [
|
||||
|
||||
],
|
||||
"autofilter_services": [
|
||||
|
||||
],
|
||||
"targets": [
|
||||
"Unix",
|
||||
"Windows",
|
||||
"Solaris"
|
||||
],
|
||||
"mod_time": "2019-04-01 17:57:28 +0000",
|
||||
"path": "/modules/exploits/multi/misc/weblogic_deserialize_unicastref.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "multi/misc/weblogic_deserialize_unicastref",
|
||||
"check": false,
|
||||
"post_auth": false,
|
||||
"default_credential": false,
|
||||
"notes": {
|
||||
}
|
||||
},
|
||||
"exploit_multi/misc/wireshark_lwres_getaddrbyname": {
|
||||
"name": "Wireshark LWRES Dissector getaddrsbyname_request Buffer Overflow",
|
||||
"full_name": "exploit/multi/misc/wireshark_lwres_getaddrbyname",
|
||||
|
|
Loading…
Reference in New Issue