1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-11-05 14:57:30 +01:00

automatic module_metadata_base.json update

This commit is contained in:
Metasploit 2018-09-20 13:32:57 -07:00
parent 185931ca91
commit 87de89ceb8
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954

View File

@ -27702,7 +27702,7 @@
"Ben Buchanan",
"herself"
],
"description": "This module implements the OpenSSL Heartbleed attack. The problem\n exists in the handling of heartbeat requests, where a fake length can\n be used to leak memory data in the response. Services that support\n STARTTLS may also be vulnerable.\n\n The module supports several actions, allowing for scanning, dumping of\n memory contents, and private key recovery.",
"description": "This module implements the OpenSSL Heartbleed attack. The problem\n exists in the handling of heartbeat requests, where a fake length can\n be used to leak memory data in the response. Services that support\n STARTTLS may also be vulnerable.\n\n The module supports several actions, allowing for scanning, dumping of\n memory contents, and private key recovery. The `repeat` command can be\n used to make running the `DUMP` many times more convenient. As in:\n repeat -t 60 run; sleep 2\n To run every two seconds for one minute.",
"references": [
"CVE-2014-0160",
"US-CERT-VU-720951",
@ -27718,7 +27718,7 @@
"arch": "",
"rport": 443,
"targets": null,
"mod_time": "2018-08-27 13:11:22 +0000",
"mod_time": "2018-09-20 15:24:03 +0000",
"path": "/modules/auxiliary/scanner/ssl/openssl_heartbleed.rb",
"is_install_path": true,
"ref_name": "scanner/ssl/openssl_heartbleed",