Skip to content

Commit 6109958

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 2635b8f commit 6109958

File tree

1 file changed

+68
-3
lines changed

1 file changed

+68
-3
lines changed

db/modules_metadata_base.json

Lines changed: 68 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22434,6 +22434,61 @@
2243422434
"needs_cleanup": false,
2243522435
"actions": []
2243622436
},
22437+
"auxiliary_gather/pacsserver_traversal": {
22438+
"name": "Sante PACS Server Path Traversal (CVE-2025-2264)",
22439+
"fullname": "auxiliary/gather/pacsserver_traversal",
22440+
"aliases": [],
22441+
"rank": 300,
22442+
"disclosure_date": "2025-03-13",
22443+
"type": "auxiliary",
22444+
"author": [
22445+
"Michael Heinzl",
22446+
"Tenable"
22447+
],
22448+
"description": "This module exploits a path traversal vulnerability (CVE-2025-2264) in Sante PACS Server <= v4.1.0 to retrieve arbitrary files from the system.",
22449+
"references": [
22450+
"CVE-2025-2264",
22451+
"URL-https://www.tenable.com/security/research/tra-2025-08"
22452+
],
22453+
"platform": "",
22454+
"arch": "",
22455+
"rport": 3000,
22456+
"autofilter_ports": [
22457+
80,
22458+
8080,
22459+
443,
22460+
8000,
22461+
8888,
22462+
8880,
22463+
8008,
22464+
3000,
22465+
8443
22466+
],
22467+
"autofilter_services": [
22468+
"http",
22469+
"https"
22470+
],
22471+
"targets": null,
22472+
"mod_time": "2025-05-06 04:02:33 +0000",
22473+
"path": "/modules/auxiliary/gather/pacsserver_traversal.rb",
22474+
"is_install_path": true,
22475+
"ref_name": "gather/pacsserver_traversal",
22476+
"check": true,
22477+
"post_auth": false,
22478+
"default_credential": false,
22479+
"notes": {
22480+
"Stability": [
22481+
"crash-safe"
22482+
],
22483+
"Reliability": [],
22484+
"SideEffects": [
22485+
"ioc-in-logs"
22486+
]
22487+
},
22488+
"session_types": false,
22489+
"needs_cleanup": false,
22490+
"actions": []
22491+
},
2243722492
"auxiliary_gather/peplink_bauth_sqli": {
2243822493
"name": "Peplink Balance routers SQLi",
2243922494
"fullname": "auxiliary/gather/peplink_bauth_sqli",
@@ -125869,7 +125924,7 @@
125869125924
"author": [
125870125925
"xistence <[email protected]>"
125871125926
],
125872-
"description": "This module exploits open X11 servers by connecting and registering a\n virtual keyboard. The virtual keyboard is used to open an xterm or gnome\n terminal and type and execute the specified payload.",
125927+
"description": "This module exploits open X11 servers by connecting and registering a\n virtual keyboard. The virtual keyboard is used to open an xterm or gnome\n terminal and type and execute the specified payload.",
125873125928
"references": [],
125874125929
"platform": "Unix",
125875125930
"arch": "cmd",
@@ -125880,14 +125935,24 @@
125880125935
"xterm (Generic)",
125881125936
"gnome-terminal (Ubuntu)"
125882125937
],
125883-
"mod_time": "2020-10-02 17:38:06 +0000",
125938+
"mod_time": "2025-05-04 16:24:31 +0000",
125884125939
"path": "/modules/exploits/unix/x11/x11_keyboard_exec.rb",
125885125940
"is_install_path": true,
125886125941
"ref_name": "unix/x11/x11_keyboard_exec",
125887125942
"check": false,
125888125943
"post_auth": false,
125889125944
"default_credential": false,
125890-
"notes": {},
125945+
"notes": {
125946+
"Stability": [
125947+
"crash-safe"
125948+
],
125949+
"SideEffects": [
125950+
"screen-effects"
125951+
],
125952+
"Reliability": [
125953+
"repeatable-session"
125954+
]
125955+
},
125891125956
"session_types": false,
125892125957
"needs_cleanup": null
125893125958
},

0 commit comments

Comments
 (0)