diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index a91f81c6e9..c5a19d33d8 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -107379,7 +107379,7 @@ "metacom", "wvu " ], - "description": "This module exploits a stack-based buffer overflow on Beetel Connection Manager. The\n vulnerability exists in the parsing of the UserName parameter in the NetConfig.ini\n file. The module has been tested successfully on PCW_BTLINDV1.0.0B04 over Windows XP\n SP3 and Windows 7 SP1.", + "description": "This module exploits a stack-based buffer overflow in Beetel Connection\n Manager. The vulnerability exists in the parsing of the UserName\n parameter in the NetConfig.ini file.\n\n The module has been tested successfully against version\n PCW_BTLINDV1.0.0B04 on Windows XP SP3 and Windows 7 SP1.", "references": [ "OSVDB-98714", "EDB-28969" @@ -107396,7 +107396,7 @@ "targets": [ "PCW_BTLINDV1.0.0B04 (WinXP SP3, Win7 SP1)" ], - "mod_time": "2018-11-16 12:18:28 +0000", + "mod_time": "2020-02-04 10:05:41 +0000", "path": "/modules/exploits/windows/fileformat/beetel_netconfig_ini_bof.rb", "is_install_path": true, "ref_name": "windows/fileformat/beetel_netconfig_ini_bof",