Skip to content

Commit 3c75e3c

Browse files
committed
automatic module_metadata_base.json update
1 parent c1826cd commit 3c75e3c

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

db/modules_metadata_base.json

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -80610,7 +80610,7 @@
8061080610
"Linux (x64)",
8061180611
"Linux (cmd)"
8061280612
],
80613-
"mod_time": "2021-10-22 22:11:51 +0000",
80613+
"mod_time": "2024-06-14 12:05:12 +0000",
8061480614
"path": "/modules/exploits/linux/http/suitecrm_log_file_rce.rb",
8061580615
"is_install_path": true,
8061680616
"ref_name": "linux/http/suitecrm_log_file_rce",
@@ -82752,7 +82752,7 @@
8275282752
"targets": [
8275382753
"VMware vRealize Log Insight < v8.10.2"
8275482754
],
82755-
"mod_time": "2023-09-12 10:16:13 +0000",
82755+
"mod_time": "2024-06-14 12:05:12 +0000",
8275682756
"path": "/modules/exploits/linux/http/vmware_vrli_rce.rb",
8275782757
"is_install_path": true,
8275882758
"ref_name": "linux/http/vmware_vrli_rce",
@@ -91160,7 +91160,7 @@
9116091160
"Minions (Python payload)",
9116191161
"Minions (Unix command)"
9116291162
],
91163-
"mod_time": "2021-09-17 16:34:46 +0000",
91163+
"mod_time": "2024-06-14 12:05:12 +0000",
9116491164
"path": "/modules/exploits/linux/misc/saltstack_salt_unauth_rce.rb",
9116591165
"is_install_path": true,
9116691166
"ref_name": "linux/misc/saltstack_salt_unauth_rce",
@@ -97554,7 +97554,7 @@
9755497554
"Unix Command",
9755597555
"Linux Dropper"
9755697556
],
97557-
"mod_time": "2024-01-05 22:31:51 +0000",
97557+
"mod_time": "2024-06-14 12:05:12 +0000",
9755897558
"path": "/modules/exploits/multi/http/apache_commons_text4shell.rb",
9755997559
"is_install_path": true,
9756097560
"ref_name": "multi/http/apache_commons_text4shell",
@@ -103615,7 +103615,7 @@
103615103615
"targets": [
103616103616
"Liferay Portal < 6.2.5 GA6, 7.0.6 GA7, 7.1.3 GA4, 7.2.1 GA2"
103617103617
],
103618-
"mod_time": "2020-08-14 13:11:38 +0000",
103618+
"mod_time": "2024-06-14 12:05:12 +0000",
103619103619
"path": "/modules/exploits/multi/http/liferay_java_unmarshalling.rb",
103620103620
"is_install_path": true,
103621103621
"ref_name": "multi/http/liferay_java_unmarshalling",
@@ -104260,7 +104260,7 @@
104260104260
"Unix Command",
104261104261
"Linux Dropper"
104262104262
],
104263-
"mod_time": "2024-03-04 20:33:27 +0000",
104263+
"mod_time": "2024-02-13 16:15:48 +0000",
104264104264
"path": "/modules/exploits/multi/http/manageengine_servicedesk_plus_saml_rce_cve_2022_47966.rb",
104265104265
"is_install_path": true,
104266104266
"ref_name": "multi/http/manageengine_servicedesk_plus_saml_rce_cve_2022_47966",
@@ -104700,7 +104700,7 @@
104700104700
"targets": [
104701104701
"Micro Focus Operations Bridge Manager <= 2020.05 (and many other MF products)"
104702104702
],
104703-
"mod_time": "2023-02-10 18:04:31 +0000",
104703+
"mod_time": "2024-06-14 12:05:12 +0000",
104704104704
"path": "/modules/exploits/multi/http/microfocus_obm_auth_rce.rb",
104705104705
"is_install_path": true,
104706104706
"ref_name": "multi/http/microfocus_obm_auth_rce",
@@ -109485,7 +109485,7 @@
109485109485
"x86/x64 Windows CmdStager",
109486109486
"Windows Exec"
109487109487
],
109488-
"mod_time": "2023-02-10 18:04:31 +0000",
109488+
"mod_time": "2024-06-14 12:05:12 +0000",
109489109489
"path": "/modules/exploits/multi/http/solr_velocity_rce.rb",
109490109490
"is_install_path": true,
109491109491
"ref_name": "multi/http/solr_velocity_rce",
@@ -111568,7 +111568,7 @@
111568111568
"targets": [
111569111569
"Automatic"
111570111570
],
111571-
"mod_time": "2023-10-11 16:56:20 +0000",
111571+
"mod_time": "2024-06-14 12:05:12 +0000",
111572111572
"path": "/modules/exploits/multi/http/torchserver_cve_2023_43654.rb",
111573111573
"is_install_path": true,
111574111574
"ref_name": "multi/http/torchserver_cve_2023_43654",
@@ -165391,7 +165391,7 @@
165391165391
"Windows EXE Dropper",
165392165392
"Windows Command"
165393165393
],
165394-
"mod_time": "2024-02-22 23:19:58 +0000",
165394+
"mod_time": "2024-06-14 12:05:12 +0000",
165395165395
"path": "/modules/exploits/windows/http/manageengine_endpoint_central_saml_rce_cve_2022_47966.rb",
165396165396
"is_install_path": true,
165397165397
"ref_name": "windows/http/manageengine_endpoint_central_saml_rce_cve_2022_47966",

0 commit comments

Comments
 (0)