@@ -164159,6 +164159,92 @@
164159164159 "session_types": false,
164160164160 "needs_cleanup": null
164161164161 },
164162+ "exploit_windows/fileformat/windows_script_host_jscript": {
164163+ "name": "Malicious Windows Script Host JScript (.js) File",
164164+ "fullname": "exploit/windows/fileformat/windows_script_host_jscript",
164165+ "aliases": [],
164166+ "rank": 500,
164167+ "disclosure_date": "1998-06-25",
164168+ "type": "exploit",
164169+ "author": [
164170+ 164171+ ],
164172+ "description": "This module creates a Windows Script Host (WSH) JScript (.js) file.",
164173+ "references": [
164174+ "ATT&CK-T1204.002"
164175+ ],
164176+ "platform": "Windows",
164177+ "arch": "cmd",
164178+ "rport": null,
164179+ "autofilter_ports": [],
164180+ "autofilter_services": [],
164181+ "targets": [
164182+ "Microsoft Windows 98 or newer"
164183+ ],
164184+ "mod_time": "2025-07-25 18:43:33 +0000",
164185+ "path": "/modules/exploits/windows/fileformat/windows_script_host_jscript.rb",
164186+ "is_install_path": true,
164187+ "ref_name": "windows/fileformat/windows_script_host_jscript",
164188+ "check": false,
164189+ "post_auth": false,
164190+ "default_credential": false,
164191+ "notes": {
164192+ "Stability": [
164193+ "crash-safe"
164194+ ],
164195+ "Reliability": [
164196+ "repeatable-session"
164197+ ],
164198+ "SideEffects": [
164199+ "screen-effects"
164200+ ]
164201+ },
164202+ "session_types": false,
164203+ "needs_cleanup": null
164204+ },
164205+ "exploit_windows/fileformat/windows_script_host_vbscript": {
164206+ "name": "Malicious Windows Script Host VBScript (.vbs) File",
164207+ "fullname": "exploit/windows/fileformat/windows_script_host_vbscript",
164208+ "aliases": [],
164209+ "rank": 500,
164210+ "disclosure_date": "1998-06-25",
164211+ "type": "exploit",
164212+ "author": [
164213+ 164214+ ],
164215+ "description": "This module creates a Windows Script Host (WSH) VBScript (.vbs) file.",
164216+ "references": [
164217+ "ATT&CK-T1204.002"
164218+ ],
164219+ "platform": "Windows",
164220+ "arch": "cmd",
164221+ "rport": null,
164222+ "autofilter_ports": [],
164223+ "autofilter_services": [],
164224+ "targets": [
164225+ "Microsoft Windows 98 or newer"
164226+ ],
164227+ "mod_time": "2025-07-25 18:46:47 +0000",
164228+ "path": "/modules/exploits/windows/fileformat/windows_script_host_vbscript.rb",
164229+ "is_install_path": true,
164230+ "ref_name": "windows/fileformat/windows_script_host_vbscript",
164231+ "check": false,
164232+ "post_auth": false,
164233+ "default_credential": false,
164234+ "notes": {
164235+ "Stability": [
164236+ "crash-safe"
164237+ ],
164238+ "Reliability": [
164239+ "repeatable-session"
164240+ ],
164241+ "SideEffects": [
164242+ "screen-effects"
164243+ ]
164244+ },
164245+ "session_types": false,
164246+ "needs_cleanup": null
164247+ },
164162164248 "exploit_windows/fileformat/winrar_ace": {
164163164249 "name": "RARLAB WinRAR ACE Format Input Validation Remote Code Execution",
164164164250 "fullname": "exploit/windows/fileformat/winrar_ace",
0 commit comments