Skip to content

Commit

Permalink
automatic module_metadata_base.json update
Browse files Browse the repository at this point in the history
  • Loading branch information
msjenkins-r7 authored and SecurityBytesMe committed Jun 9, 2020
1 parent 7b1c79a commit 494ed39
Showing 1 changed file with 4 additions and 4 deletions.
8 changes: 4 additions & 4 deletions db/modules_metadata_base.json
Expand Up @@ -144245,7 +144245,7 @@
"modpr0be",
"sinn3r <sinn3r@metasploit.com>"
],
"description": "This module exploits a vulnerability found in Distinct TFTP server. The\n software contains a directory traversal vulnerability that allows a remote\n attacker to write arbitrary file to the file system, which results in\n code execution under the context of 'SYSTEM'.",
"description": "This module exploits a directory traversal vulnerability in the TFTP\n Server component of Distinct Intranet Servers version 3.10 which\n allows a remote attacker to write arbitrary files to the server file\n system, resulting in code execution under the context of 'SYSTEM'.\n This module has been tested successfully on TFTP Server version 3.10\n on Windows XP SP3 (EN).",
"references": [
"OSVDB-80984",
"EDB-18718",
Expand All @@ -144262,9 +144262,9 @@

],
"targets": [
"Distinct TFTP 3.10 on Windows"
"Automatic"
],
"mod_time": "2017-07-24 06:26:21 +0000",
"mod_time": "2020-05-14 05:22:36 +0000",
"path": "/modules/exploits/windows/tftp/distinct_tftp_traversal.rb",
"is_install_path": true,
"ref_name": "windows/tftp/distinct_tftp_traversal",
Expand All @@ -144273,7 +144273,7 @@
"default_credential": false,
"notes": {
},
"needs_cleanup": null
"needs_cleanup": true
},
"exploit_windows/tftp/dlink_long_filename": {
"name": "D-Link TFTP 1.0 Long Filename Buffer Overflow",
Expand Down

0 comments on commit 494ed39

Please sign in to comment.