From 87de89ceb80cb3bcf46778ebcee38c4ba2a684e5 Mon Sep 17 00:00:00 2001 From: Metasploit Date: Thu, 20 Sep 2018 13:32:57 -0700 Subject: [PATCH] automatic module_metadata_base.json update --- db/modules_metadata_base.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index 41c215d32d..7c0c32be28 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -27702,7 +27702,7 @@ "Ben Buchanan", "herself" ], - "description": "This module implements the OpenSSL Heartbleed attack. The problem\n exists in the handling of heartbeat requests, where a fake length can\n be used to leak memory data in the response. Services that support\n STARTTLS may also be vulnerable.\n\n The module supports several actions, allowing for scanning, dumping of\n memory contents, and private key recovery.", + "description": "This module implements the OpenSSL Heartbleed attack. The problem\n exists in the handling of heartbeat requests, where a fake length can\n be used to leak memory data in the response. Services that support\n STARTTLS may also be vulnerable.\n\n The module supports several actions, allowing for scanning, dumping of\n memory contents, and private key recovery. The `repeat` command can be\n used to make running the `DUMP` many times more convenient. As in:\n repeat -t 60 run; sleep 2\n To run every two seconds for one minute.", "references": [ "CVE-2014-0160", "US-CERT-VU-720951", @@ -27718,7 +27718,7 @@ "arch": "", "rport": 443, "targets": null, - "mod_time": "2018-08-27 13:11:22 +0000", + "mod_time": "2018-09-20 15:24:03 +0000", "path": "/modules/auxiliary/scanner/ssl/openssl_heartbleed.rb", "is_install_path": true, "ref_name": "scanner/ssl/openssl_heartbleed",