Skip to content

Commit

Permalink
automatic module_metadata_base.json update
Browse files Browse the repository at this point in the history
  • Loading branch information
msjenkins-r7 committed Feb 19, 2020
1 parent db8555e commit 9010446
Showing 1 changed file with 47 additions and 1 deletion.
48 changes: 47 additions & 1 deletion db/modules_metadata_base.json
Original file line number Diff line number Diff line change
Expand Up @@ -60003,6 +60003,52 @@
},
"needs_cleanup": null
},
"exploit_linux/local/diamorphine_rootkit_signal_priv_esc": {
"name": "Diamorphine Rootkit Signal Privilege Escalation",
"fullname": "exploit/linux/local/diamorphine_rootkit_signal_priv_esc",
"aliases": [

],
"rank": 600,
"disclosure_date": "2013-11-07",
"type": "exploit",
"author": [
"m0nad",
"bcoles <bcoles@gmail.com>"
],
"description": "This module uses Diamorphine rootkit's privesc feature using signal\n 64 to elevate the privileges of arbitrary processes to UID 0 (root).\n\n This module has been tested successfully with Diamorphine from `master`\n branch (2019-10-04) on Linux Mint 19 kernel 4.15.0-20-generic (x64).",
"references": [
"URL-https://github.com/m0nad/Diamorphine"
],
"platform": "Linux",
"arch": "x86, x64",
"rport": null,
"autofilter_ports": [

],
"autofilter_services": [

],
"targets": [
"Auto"
],
"mod_time": "2020-02-16 14:53:16 +0000",
"path": "/modules/exploits/linux/local/diamorphine_rootkit_signal_priv_esc.rb",
"is_install_path": true,
"ref_name": "linux/local/diamorphine_rootkit_signal_priv_esc",
"check": true,
"post_auth": false,
"default_credential": false,
"notes": {
"Reliability": [
"repeatable-session"
],
"Stability": [
"crash-safe"
]
},
"needs_cleanup": true
},
"exploit_linux/local/docker_daemon_privilege_escalation": {
"name": "Docker Daemon Privilege Escalation",
"fullname": "exploit/linux/local/docker_daemon_privilege_escalation",
Expand Down Expand Up @@ -131925,7 +131971,7 @@
"targets": [
"Crosschex Standard x86 <= V4.3.12"
],
"mod_time": "2020-02-13 14:17:23 +0000",
"mod_time": "2020-02-18 23:18:45 +0000",
"path": "/modules/exploits/windows/misc/crosschex_device_bof.rb",
"is_install_path": true,
"ref_name": "windows/misc/crosschex_device_bof",
Expand Down

0 comments on commit 9010446

Please sign in to comment.