Skip to content

Commit 04b08fb

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent afeded5 commit 04b08fb

File tree

1 file changed

+48
-0
lines changed

1 file changed

+48
-0
lines changed

db/modules_metadata_base.json

Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -164111,6 +164111,54 @@
164111164111
"session_types": false,
164112164112
"needs_cleanup": null
164113164113
},
164114+
"exploit_windows/fileformat/windows_registration_entries": {
164115+
"name": "Malicious Windows Registration Entries (.reg) File",
164116+
"fullname": "exploit/windows/fileformat/windows_registration_entries",
164117+
"aliases": [],
164118+
"rank": 500,
164119+
"disclosure_date": "1995-08-24",
164120+
"type": "exploit",
164121+
"author": [
164122+
"bcoles <[email protected]>"
164123+
],
164124+
"description": "This module creates a Windows Registration Entries (.reg) file which\n adds the specified payload to the Windows Registry. The payload runs\n upon Windows login for the current user. If the user has elevated\n privileges when opening the file, the payload will run upon login\n when any user logs in.\n\n The user will receive a warning prompt to confirm Registry changes\n when opening the file.",
164125+
"references": [
164126+
"URL-https://support.microsoft.com/en-us/topic/how-to-add-modify-or-delete-registry-subkeys-and-values-by-using-a-reg-file-9c7f37cf-a5e9-e1cd-c4fa-2a26218a1a23",
164127+
"URL-https://learn.microsoft.com/en-us/windows/win32/setupapi/run-and-runonce-registry-keys",
164128+
"URL-https://learn.microsoft.com/en-us/windows-hardware/drivers/install/runonce-registry-key",
164129+
"ATT&CK-T1204.002",
164130+
"ATT&CK-T1547.001"
164131+
],
164132+
"platform": "Windows",
164133+
"arch": "cmd",
164134+
"rport": null,
164135+
"autofilter_ports": [],
164136+
"autofilter_services": [],
164137+
"targets": [
164138+
"Microsoft Windows 2000 or newer"
164139+
],
164140+
"mod_time": "2025-07-13 23:41:59 +0000",
164141+
"path": "/modules/exploits/windows/fileformat/windows_registration_entries.rb",
164142+
"is_install_path": true,
164143+
"ref_name": "windows/fileformat/windows_registration_entries",
164144+
"check": false,
164145+
"post_auth": false,
164146+
"default_credential": false,
164147+
"notes": {
164148+
"Stability": [
164149+
"crash-safe"
164150+
],
164151+
"Reliability": [
164152+
"repeatable-session",
164153+
"event-dependent"
164154+
],
164155+
"SideEffects": [
164156+
"screen-effects"
164157+
]
164158+
},
164159+
"session_types": false,
164160+
"needs_cleanup": null
164161+
},
164114164162
"exploit_windows/fileformat/winrar_ace": {
164115164163
"name": "RARLAB WinRAR ACE Format Input Validation Remote Code Execution",
164116164164
"fullname": "exploit/windows/fileformat/winrar_ace",

0 commit comments

Comments
 (0)