@@ -165680,6 +165680,49 @@
165680165680 "session_types": false,
165681165681 "needs_cleanup": null
165682165682 },
165683+ "exploit_windows/fileformat/windows_script_host_wsf": {
165684+ "name": "Malicious Windows Script Host Script File (.wsf)",
165685+ "fullname": "exploit/windows/fileformat/windows_script_host_wsf",
165686+ "aliases": [],
165687+ "rank": 500,
165688+ "disclosure_date": "1998-06-25",
165689+ "type": "exploit",
165690+ "author": [
165691+ 165692+ ],
165693+ "description": "This module creates a Windows Script Host (WSH) Windows Script File (.wsf).",
165694+ "references": [
165695+ "ATT&CK-T1204.002"
165696+ ],
165697+ "platform": "Windows",
165698+ "arch": "cmd",
165699+ "rport": null,
165700+ "autofilter_ports": [],
165701+ "autofilter_services": [],
165702+ "targets": [
165703+ "Microsoft Windows 98 or newer"
165704+ ],
165705+ "mod_time": "2025-10-05 20:16:00 +0000",
165706+ "path": "/modules/exploits/windows/fileformat/windows_script_host_wsf.rb",
165707+ "is_install_path": true,
165708+ "ref_name": "windows/fileformat/windows_script_host_wsf",
165709+ "check": false,
165710+ "post_auth": false,
165711+ "default_credential": false,
165712+ "notes": {
165713+ "Stability": [
165714+ "crash-safe"
165715+ ],
165716+ "Reliability": [
165717+ "repeatable-session"
165718+ ],
165719+ "SideEffects": [
165720+ "screen-effects"
165721+ ]
165722+ },
165723+ "session_types": false,
165724+ "needs_cleanup": null
165725+ },
165683165726 "exploit_windows/fileformat/winrar_ace": {
165684165727 "name": "RARLAB WinRAR ACE Format Input Validation Remote Code Execution",
165685165728 "fullname": "exploit/windows/fileformat/winrar_ace",
0 commit comments