Skip to content

Commit

Permalink
automatic module_metadata_base.json update
Browse files Browse the repository at this point in the history
  • Loading branch information
msjenkins-r7 committed May 15, 2020
1 parent 9c249e8 commit 614ff3d
Showing 1 changed file with 4 additions and 4 deletions.
8 changes: 4 additions & 4 deletions db/modules_metadata_base.json
Expand Up @@ -144245,7 +144245,7 @@
"modpr0be",
"sinn3r <sinn3r@metasploit.com>"
],
"description": "This module exploits a vulnerability found in Distinct TFTP server. The\n software contains a directory traversal vulnerability that allows a remote\n attacker to write arbitrary file to the file system, which results in\n code execution under the context of 'SYSTEM'.",
"description": "This module exploits a directory traversal vulnerability in the TFTP\n Server component of Distinct Intranet Servers version 3.10 which\n allows a remote attacker to write arbitrary files to the server file\n system, resulting in code execution under the context of 'SYSTEM'.\n This module has been tested successfully on TFTP Server version 3.10\n on Windows XP SP3 (EN).",
"references": [
"OSVDB-80984",
"EDB-18718",
Expand All @@ -144262,9 +144262,9 @@

],
"targets": [
"Distinct TFTP 3.10 on Windows"
"Automatic"
],
"mod_time": "2017-07-24 06:26:21 +0000",
"mod_time": "2020-05-14 05:22:36 +0000",
"path": "/modules/exploits/windows/tftp/distinct_tftp_traversal.rb",
"is_install_path": true,
"ref_name": "windows/tftp/distinct_tftp_traversal",
Expand All @@ -144273,7 +144273,7 @@
"default_credential": false,
"notes": {
},
"needs_cleanup": null
"needs_cleanup": true
},
"exploit_windows/tftp/dlink_long_filename": {
"name": "D-Link TFTP 1.0 Long Filename Buffer Overflow",
Expand Down

0 comments on commit 614ff3d

Please sign in to comment.