|
80610 | 80610 | "Linux (x64)",
|
80611 | 80611 | "Linux (cmd)"
|
80612 | 80612 | ],
|
80613 |
| - "mod_time": "2021-10-22 22:11:51 +0000", |
| 80613 | + "mod_time": "2024-06-14 12:05:12 +0000", |
80614 | 80614 | "path": "/modules/exploits/linux/http/suitecrm_log_file_rce.rb",
|
80615 | 80615 | "is_install_path": true,
|
80616 | 80616 | "ref_name": "linux/http/suitecrm_log_file_rce",
|
|
82752 | 82752 | "targets": [
|
82753 | 82753 | "VMware vRealize Log Insight < v8.10.2"
|
82754 | 82754 | ],
|
82755 |
| - "mod_time": "2023-09-12 10:16:13 +0000", |
| 82755 | + "mod_time": "2024-06-14 12:05:12 +0000", |
82756 | 82756 | "path": "/modules/exploits/linux/http/vmware_vrli_rce.rb",
|
82757 | 82757 | "is_install_path": true,
|
82758 | 82758 | "ref_name": "linux/http/vmware_vrli_rce",
|
|
91160 | 91160 | "Minions (Python payload)",
|
91161 | 91161 | "Minions (Unix command)"
|
91162 | 91162 | ],
|
91163 |
| - "mod_time": "2021-09-17 16:34:46 +0000", |
| 91163 | + "mod_time": "2024-06-14 12:05:12 +0000", |
91164 | 91164 | "path": "/modules/exploits/linux/misc/saltstack_salt_unauth_rce.rb",
|
91165 | 91165 | "is_install_path": true,
|
91166 | 91166 | "ref_name": "linux/misc/saltstack_salt_unauth_rce",
|
|
97554 | 97554 | "Unix Command",
|
97555 | 97555 | "Linux Dropper"
|
97556 | 97556 | ],
|
97557 |
| - "mod_time": "2024-01-05 22:31:51 +0000", |
| 97557 | + "mod_time": "2024-06-14 12:05:12 +0000", |
97558 | 97558 | "path": "/modules/exploits/multi/http/apache_commons_text4shell.rb",
|
97559 | 97559 | "is_install_path": true,
|
97560 | 97560 | "ref_name": "multi/http/apache_commons_text4shell",
|
@@ -103615,7 +103615,7 @@
|
103615 | 103615 | "targets": [
|
103616 | 103616 | "Liferay Portal < 6.2.5 GA6, 7.0.6 GA7, 7.1.3 GA4, 7.2.1 GA2"
|
103617 | 103617 | ],
|
103618 |
| - "mod_time": "2020-08-14 13:11:38 +0000", |
| 103618 | + "mod_time": "2024-06-14 12:05:12 +0000", |
103619 | 103619 | "path": "/modules/exploits/multi/http/liferay_java_unmarshalling.rb",
|
103620 | 103620 | "is_install_path": true,
|
103621 | 103621 | "ref_name": "multi/http/liferay_java_unmarshalling",
|
@@ -104260,7 +104260,7 @@
|
104260 | 104260 | "Unix Command",
|
104261 | 104261 | "Linux Dropper"
|
104262 | 104262 | ],
|
104263 |
| - "mod_time": "2024-03-04 20:33:27 +0000", |
| 104263 | + "mod_time": "2024-02-13 16:15:48 +0000", |
104264 | 104264 | "path": "/modules/exploits/multi/http/manageengine_servicedesk_plus_saml_rce_cve_2022_47966.rb",
|
104265 | 104265 | "is_install_path": true,
|
104266 | 104266 | "ref_name": "multi/http/manageengine_servicedesk_plus_saml_rce_cve_2022_47966",
|
@@ -104700,7 +104700,7 @@
|
104700 | 104700 | "targets": [
|
104701 | 104701 | "Micro Focus Operations Bridge Manager <= 2020.05 (and many other MF products)"
|
104702 | 104702 | ],
|
104703 |
| - "mod_time": "2023-02-10 18:04:31 +0000", |
| 104703 | + "mod_time": "2024-06-14 12:05:12 +0000", |
104704 | 104704 | "path": "/modules/exploits/multi/http/microfocus_obm_auth_rce.rb",
|
104705 | 104705 | "is_install_path": true,
|
104706 | 104706 | "ref_name": "multi/http/microfocus_obm_auth_rce",
|
@@ -109485,7 +109485,7 @@
|
109485 | 109485 | "x86/x64 Windows CmdStager",
|
109486 | 109486 | "Windows Exec"
|
109487 | 109487 | ],
|
109488 |
| - "mod_time": "2023-02-10 18:04:31 +0000", |
| 109488 | + "mod_time": "2024-06-14 12:05:12 +0000", |
109489 | 109489 | "path": "/modules/exploits/multi/http/solr_velocity_rce.rb",
|
109490 | 109490 | "is_install_path": true,
|
109491 | 109491 | "ref_name": "multi/http/solr_velocity_rce",
|
@@ -111568,7 +111568,7 @@
|
111568 | 111568 | "targets": [
|
111569 | 111569 | "Automatic"
|
111570 | 111570 | ],
|
111571 |
| - "mod_time": "2023-10-11 16:56:20 +0000", |
| 111571 | + "mod_time": "2024-06-14 12:05:12 +0000", |
111572 | 111572 | "path": "/modules/exploits/multi/http/torchserver_cve_2023_43654.rb",
|
111573 | 111573 | "is_install_path": true,
|
111574 | 111574 | "ref_name": "multi/http/torchserver_cve_2023_43654",
|
@@ -165391,7 +165391,7 @@
|
165391 | 165391 | "Windows EXE Dropper",
|
165392 | 165392 | "Windows Command"
|
165393 | 165393 | ],
|
165394 |
| - "mod_time": "2024-02-22 23:19:58 +0000", |
| 165394 | + "mod_time": "2024-06-14 12:05:12 +0000", |
165395 | 165395 | "path": "/modules/exploits/windows/http/manageengine_endpoint_central_saml_rce_cve_2022_47966.rb",
|
165396 | 165396 | "is_install_path": true,
|
165397 | 165397 | "ref_name": "windows/http/manageengine_endpoint_central_saml_rce_cve_2022_47966",
|
|
0 commit comments