automatic module_metadata_base.json update
This commit is contained in:
@@ -107379,7 +107379,7 @@
|
||||
"metacom",
|
||||
"wvu <wvu@metasploit.com>"
|
||||
],
|
||||
"description": "This module exploits a stack-based buffer overflow on Beetel Connection Manager. The\n vulnerability exists in the parsing of the UserName parameter in the NetConfig.ini\n file. The module has been tested successfully on PCW_BTLINDV1.0.0B04 over Windows XP\n SP3 and Windows 7 SP1.",
|
||||
"description": "This module exploits a stack-based buffer overflow in Beetel Connection\n Manager. The vulnerability exists in the parsing of the UserName\n parameter in the NetConfig.ini file.\n\n The module has been tested successfully against version\n PCW_BTLINDV1.0.0B04 on Windows XP SP3 and Windows 7 SP1.",
|
||||
"references": [
|
||||
"OSVDB-98714",
|
||||
"EDB-28969"
|
||||
@@ -107396,7 +107396,7 @@
|
||||
"targets": [
|
||||
"PCW_BTLINDV1.0.0B04 (WinXP SP3, Win7 SP1)"
|
||||
],
|
||||
"mod_time": "2018-11-16 12:18:28 +0000",
|
||||
"mod_time": "2020-02-04 10:05:41 +0000",
|
||||
"path": "/modules/exploits/windows/fileformat/beetel_netconfig_ini_bof.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "windows/fileformat/beetel_netconfig_ini_bof",
|
||||
|
||||
Reference in New Issue
Block a user