1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
| "auxiliary_admin/backupexec/dump": { "name": "Veritas Backup Exec Windows Remote File Access", "fullname": "auxiliary/admin/backupexec/dump", "aliases": [
], "rank": 300, "disclosure_date": null, "type": "auxiliary", "author": [ "hdm <x@hdm.io>", "Unknown" ], "description": "This module abuses a logic flaw in the Backup Exec Windows Agent to download\n arbitrary files from the system. This flaw was found by someone who wishes to\n remain anonymous and affects all known versions of the Backup Exec Windows Agent. The\n output file is in 'MTF' format, which can be extracted by the 'NTKBUp' program\n listed in the references section. To transfer an entire directory, specify a\n path that includes a trailing backslash.", "references": [ "CVE-2005-2611", "OSVDB-18695", "BID-14551", "URL-http://www.fpns.net/willy/msbksrc.lzh" ], "platform": "", "arch": "", "rport": 10000, "autofilter_ports": [
], "autofilter_services": [
], "targets": null, "mod_time": "2021-02-26 10:13:11 +0000", "path": "/modules/auxiliary/admin/backupexec/dump.rb", "is_install_path": true, "ref_name": "admin/backupexec/dump", "check": false, "post_auth": false, "default_credential": false, "notes": { }, "session_types": false, "needs_cleanup": false },
|