@@ -164159,6 +164159,92 @@
164159
164159
"session_types": false,
164160
164160
"needs_cleanup": null
164161
164161
},
164162
+ "exploit_windows/fileformat/windows_script_host_jscript": {
164163
+ "name": "Malicious Windows Script Host JScript (.js) File",
164164
+ "fullname": "exploit/windows/fileformat/windows_script_host_jscript",
164165
+ "aliases": [],
164166
+ "rank": 500,
164167
+ "disclosure_date": "1998-06-25",
164168
+ "type": "exploit",
164169
+ "author": [
164170
+
164171
+ ],
164172
+ "description": "This module creates a Windows Script Host (WSH) JScript (.js) file.",
164173
+ "references": [
164174
+ "ATT&CK-T1204.002"
164175
+ ],
164176
+ "platform": "Windows",
164177
+ "arch": "cmd",
164178
+ "rport": null,
164179
+ "autofilter_ports": [],
164180
+ "autofilter_services": [],
164181
+ "targets": [
164182
+ "Microsoft Windows 98 or newer"
164183
+ ],
164184
+ "mod_time": "2025-07-25 18:43:33 +0000",
164185
+ "path": "/modules/exploits/windows/fileformat/windows_script_host_jscript.rb",
164186
+ "is_install_path": true,
164187
+ "ref_name": "windows/fileformat/windows_script_host_jscript",
164188
+ "check": false,
164189
+ "post_auth": false,
164190
+ "default_credential": false,
164191
+ "notes": {
164192
+ "Stability": [
164193
+ "crash-safe"
164194
+ ],
164195
+ "Reliability": [
164196
+ "repeatable-session"
164197
+ ],
164198
+ "SideEffects": [
164199
+ "screen-effects"
164200
+ ]
164201
+ },
164202
+ "session_types": false,
164203
+ "needs_cleanup": null
164204
+ },
164205
+ "exploit_windows/fileformat/windows_script_host_vbscript": {
164206
+ "name": "Malicious Windows Script Host VBScript (.vbs) File",
164207
+ "fullname": "exploit/windows/fileformat/windows_script_host_vbscript",
164208
+ "aliases": [],
164209
+ "rank": 500,
164210
+ "disclosure_date": "1998-06-25",
164211
+ "type": "exploit",
164212
+ "author": [
164213
+
164214
+ ],
164215
+ "description": "This module creates a Windows Script Host (WSH) VBScript (.vbs) file.",
164216
+ "references": [
164217
+ "ATT&CK-T1204.002"
164218
+ ],
164219
+ "platform": "Windows",
164220
+ "arch": "cmd",
164221
+ "rport": null,
164222
+ "autofilter_ports": [],
164223
+ "autofilter_services": [],
164224
+ "targets": [
164225
+ "Microsoft Windows 98 or newer"
164226
+ ],
164227
+ "mod_time": "2025-07-25 18:46:47 +0000",
164228
+ "path": "/modules/exploits/windows/fileformat/windows_script_host_vbscript.rb",
164229
+ "is_install_path": true,
164230
+ "ref_name": "windows/fileformat/windows_script_host_vbscript",
164231
+ "check": false,
164232
+ "post_auth": false,
164233
+ "default_credential": false,
164234
+ "notes": {
164235
+ "Stability": [
164236
+ "crash-safe"
164237
+ ],
164238
+ "Reliability": [
164239
+ "repeatable-session"
164240
+ ],
164241
+ "SideEffects": [
164242
+ "screen-effects"
164243
+ ]
164244
+ },
164245
+ "session_types": false,
164246
+ "needs_cleanup": null
164247
+ },
164162
164248
"exploit_windows/fileformat/winrar_ace": {
164163
164249
"name": "RARLAB WinRAR ACE Format Input Validation Remote Code Execution",
164164
164250
"fullname": "exploit/windows/fileformat/winrar_ace",
0 commit comments