We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent fe7334f commit 7fd59b9Copy full SHA for 7fd59b9
modules/exploits/multi/http/cleo_rce_cve_2024_55956.rb
@@ -32,7 +32,7 @@ def initialize(info = {})
32
['URL', 'https://www.rapid7.com/blog/post/2024/12/10/etr-widespread-exploitation-of-cleo-file-transfer-software-cve-2024-50623/'], # Rapid7 Blog
33
['URL', 'https://www.huntress.com/blog/threat-advisory-oh-no-cleo-cleo-software-actively-being-exploited-in-the-wild'] # Huntress Blog
34
],
35
- 'DisclosureDate' => '2024-12-9',
+ 'DisclosureDate' => '2024-12-09',
36
'Platform' => %w[java win linux unix],
37
'Arch' => [ARCH_JAVA, ARCH_CMD],
38
'Privileged' => true, # 'NT AUTHORITY\SYSTEM' on Windows. On Linux it depends how the product was installed.
0 commit comments