diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index d3bb2d497786..2638203512a1 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -144245,7 +144245,7 @@ "modpr0be", "sinn3r " ], - "description": "This module exploits a vulnerability found in Distinct TFTP server. The\n software contains a directory traversal vulnerability that allows a remote\n attacker to write arbitrary file to the file system, which results in\n code execution under the context of 'SYSTEM'.", + "description": "This module exploits a directory traversal vulnerability in the TFTP\n Server component of Distinct Intranet Servers version 3.10 which\n allows a remote attacker to write arbitrary files to the server file\n system, resulting in code execution under the context of 'SYSTEM'.\n This module has been tested successfully on TFTP Server version 3.10\n on Windows XP SP3 (EN).", "references": [ "OSVDB-80984", "EDB-18718", @@ -144262,9 +144262,9 @@ ], "targets": [ - "Distinct TFTP 3.10 on Windows" + "Automatic" ], - "mod_time": "2017-07-24 06:26:21 +0000", + "mod_time": "2020-05-14 05:22:36 +0000", "path": "/modules/exploits/windows/tftp/distinct_tftp_traversal.rb", "is_install_path": true, "ref_name": "windows/tftp/distinct_tftp_traversal", @@ -144273,7 +144273,7 @@ "default_credential": false, "notes": { }, - "needs_cleanup": null + "needs_cleanup": true }, "exploit_windows/tftp/dlink_long_filename": { "name": "D-Link TFTP 1.0 Long Filename Buffer Overflow",