Skip to content

Commit e40da3a

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent f4622d8 commit e40da3a

File tree

1 file changed

+86
-0
lines changed

1 file changed

+86
-0
lines changed

db/modules_metadata_base.json

Lines changed: 86 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -164159,6 +164159,92 @@
164159164159
"session_types": false,
164160164160
"needs_cleanup": null
164161164161
},
164162+
"exploit_windows/fileformat/windows_script_host_jscript": {
164163+
"name": "Malicious Windows Script Host JScript (.js) File",
164164+
"fullname": "exploit/windows/fileformat/windows_script_host_jscript",
164165+
"aliases": [],
164166+
"rank": 500,
164167+
"disclosure_date": "1998-06-25",
164168+
"type": "exploit",
164169+
"author": [
164170+
"bcoles <[email protected]>"
164171+
],
164172+
"description": "This module creates a Windows Script Host (WSH) JScript (.js) file.",
164173+
"references": [
164174+
"ATT&CK-T1204.002"
164175+
],
164176+
"platform": "Windows",
164177+
"arch": "cmd",
164178+
"rport": null,
164179+
"autofilter_ports": [],
164180+
"autofilter_services": [],
164181+
"targets": [
164182+
"Microsoft Windows 98 or newer"
164183+
],
164184+
"mod_time": "2025-07-25 18:43:33 +0000",
164185+
"path": "/modules/exploits/windows/fileformat/windows_script_host_jscript.rb",
164186+
"is_install_path": true,
164187+
"ref_name": "windows/fileformat/windows_script_host_jscript",
164188+
"check": false,
164189+
"post_auth": false,
164190+
"default_credential": false,
164191+
"notes": {
164192+
"Stability": [
164193+
"crash-safe"
164194+
],
164195+
"Reliability": [
164196+
"repeatable-session"
164197+
],
164198+
"SideEffects": [
164199+
"screen-effects"
164200+
]
164201+
},
164202+
"session_types": false,
164203+
"needs_cleanup": null
164204+
},
164205+
"exploit_windows/fileformat/windows_script_host_vbscript": {
164206+
"name": "Malicious Windows Script Host VBScript (.vbs) File",
164207+
"fullname": "exploit/windows/fileformat/windows_script_host_vbscript",
164208+
"aliases": [],
164209+
"rank": 500,
164210+
"disclosure_date": "1998-06-25",
164211+
"type": "exploit",
164212+
"author": [
164213+
"bcoles <[email protected]>"
164214+
],
164215+
"description": "This module creates a Windows Script Host (WSH) VBScript (.vbs) file.",
164216+
"references": [
164217+
"ATT&CK-T1204.002"
164218+
],
164219+
"platform": "Windows",
164220+
"arch": "cmd",
164221+
"rport": null,
164222+
"autofilter_ports": [],
164223+
"autofilter_services": [],
164224+
"targets": [
164225+
"Microsoft Windows 98 or newer"
164226+
],
164227+
"mod_time": "2025-07-25 18:46:47 +0000",
164228+
"path": "/modules/exploits/windows/fileformat/windows_script_host_vbscript.rb",
164229+
"is_install_path": true,
164230+
"ref_name": "windows/fileformat/windows_script_host_vbscript",
164231+
"check": false,
164232+
"post_auth": false,
164233+
"default_credential": false,
164234+
"notes": {
164235+
"Stability": [
164236+
"crash-safe"
164237+
],
164238+
"Reliability": [
164239+
"repeatable-session"
164240+
],
164241+
"SideEffects": [
164242+
"screen-effects"
164243+
]
164244+
},
164245+
"session_types": false,
164246+
"needs_cleanup": null
164247+
},
164162164248
"exploit_windows/fileformat/winrar_ace": {
164163164249
"name": "RARLAB WinRAR ACE Format Input Validation Remote Code Execution",
164164164250
"fullname": "exploit/windows/fileformat/winrar_ace",

0 commit comments

Comments
 (0)