1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-08-28 23:26:18 +02:00

automatic module_metadata_base.json update

This commit is contained in:
Metasploit 2018-10-08 14:17:40 -07:00
parent 96681b03d1
commit 836df898cf
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954

View File

@ -121417,14 +121417,18 @@
"disclosure_date": "2018-07-02",
"type": "exploit",
"author": [
"ZDI",
"t4rkd3vilz",
"hubertwslin"
],
"description": "This module exploits a stack based buffer overflow in Delta Electronics Delta Industrial\n Automation COMMGR 1.08. The vulnerability exists in COMMGR.exe when handling specially\n crafted packets. This module has been tested successfully on Delta Electronics Delta\n Industrial Automation COMMGR 1.08 over\n Windows XP SP3,\n Windows 7 SP1, and\n Windows 8.1.",
"references": [
"EDB-44965",
"CVE-2018-10594",
"ZDI-18-588"
"BID-104529",
"ZDI-18-586",
"ZDI-18-588",
"EDB-44965",
"URL-https://ics-cert.us-cert.gov/advisories/ICSA-18-172-01"
],
"is_server": true,
"is_client": false,
@ -121440,7 +121444,7 @@
"targets": [
"COMMGR 1.08 / Windows Universal"
],
"mod_time": "2018-10-08 13:48:52 +0000",
"mod_time": "2018-10-08 14:15:21 +0000",
"path": "/modules/exploits/windows/scada/delta_ia_commgr_bof.rb",
"is_install_path": true,
"ref_name": "windows/scada/delta_ia_commgr_bof",
@ -146803,7 +146807,7 @@
],
"is_server": false,
"is_client": false,
"platform": "AIX,Android,Apple_iOS,BSD,BSDi,Cisco,Firefox,FreeBSD,HPUX,Hardware,Irix,Java,JavaScript,Juniper,Linux,Mainframe,Multi,NetBSD,Netware,NodeJS,OSX,OpenBSD,PHP,Python,R,Ruby,Solaris,Unix,Windows",
"platform": "AIX,Android,Apple_iOS,BSD,BSDi,Cisco,Firefox,FreeBSD,HPUX,Hardware,Irix,Java,JavaScript,Juniper,Linux,Mainframe,Multi,NetBSD,Netware,NodeJS,OSX,OpenBSD,PHP,Python,R,Ruby,Solaris,Unix,Unknown,Windows",
"arch": "",
"rport": null,
"autofilter_ports": null,