Skip to content

Commit 3e82156

Browse files
committed
automatic module_metadata_base.json update
1 parent 1527104 commit 3e82156

File tree

1 file changed

+18
-18
lines changed

1 file changed

+18
-18
lines changed

db/modules_metadata_base.json

Lines changed: 18 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -24023,7 +24023,7 @@
2402324023
"https"
2402424024
],
2402524025
"targets": null,
24026-
"mod_time": "2024-07-18 11:56:22 +0000",
24026+
"mod_time": "2024-07-19 12:33:13 +0000",
2402724027
"path": "/modules/auxiliary/gather/magento_xxe_cve_2024_34102.rb",
2402824028
"is_install_path": true,
2402924029
"ref_name": "gather/magento_xxe_cve_2024_34102",
@@ -71102,7 +71102,7 @@
7110271102
"CMD",
7110371103
"Linux mipsel Payload"
7110471104
],
71105-
"mod_time": "2020-10-02 17:38:06 +0000",
71105+
"mod_time": "2024-07-26 17:30:25 +0000",
7110671106
"path": "/modules/exploits/linux/http/dlink_diagnostic_exec_noauth.rb",
7110771107
"is_install_path": true,
7110871108
"ref_name": "linux/http/dlink_diagnostic_exec_noauth",
@@ -71260,7 +71260,7 @@
7126071260
"CMD",
7126171261
"Linux mipsel Payload"
7126271262
],
71263-
"mod_time": "2020-10-02 17:38:06 +0000",
71263+
"mod_time": "2024-07-26 17:30:25 +0000",
7126471264
"path": "/modules/exploits/linux/http/dlink_dir615_up_exec.rb",
7126571265
"is_install_path": true,
7126671266
"ref_name": "linux/http/dlink_dir615_up_exec",
@@ -71746,7 +71746,7 @@
7174671746
"Dlink DIR-818 / 822 / 823 / 850 [MIPS]",
7174771747
"Dlink DIR-868 (rev. B and C) / 880 / 885 / 890 / 895 [ARM]"
7174871748
],
71749-
"mod_time": "2020-10-02 17:38:06 +0000",
71749+
"mod_time": "2024-09-05 08:49:32 +0000",
7175071750
"path": "/modules/exploits/linux/http/dlink_hnap_login_bof.rb",
7175171751
"is_install_path": true,
7175271752
"ref_name": "linux/http/dlink_hnap_login_bof",
@@ -75856,7 +75856,7 @@
7585675856
"CMD",
7585775857
"Linux mipsel Payload"
7585875858
],
75859-
"mod_time": "2020-10-02 17:38:06 +0000",
75859+
"mod_time": "2024-07-26 17:30:25 +0000",
7586075860
"path": "/modules/exploits/linux/http/linksys_e1500_apply_exec.rb",
7586175861
"is_install_path": true,
7586275862
"ref_name": "linux/http/linksys_e1500_apply_exec",
@@ -76078,7 +76078,7 @@
7607876078
"CMD",
7607976079
"Linux mipsel Payload"
7608076080
],
76081-
"mod_time": "2020-10-02 17:38:06 +0000",
76081+
"mod_time": "2024-07-26 17:30:25 +0000",
7608276082
"path": "/modules/exploits/linux/http/linksys_wrt54gl_apply_exec.rb",
7608376083
"is_install_path": true,
7608476084
"ref_name": "linux/http/linksys_wrt54gl_apply_exec",
@@ -77676,7 +77676,7 @@
7767677676
"CMD",
7767777677
"Linux mipsbe Payload"
7767877678
],
77679-
"mod_time": "2020-10-02 17:38:06 +0000",
77679+
"mod_time": "2024-07-26 17:30:25 +0000",
7768077680
"path": "/modules/exploits/linux/http/netgear_dgn1000b_setup_exec.rb",
7768177681
"is_install_path": true,
7768277682
"ref_name": "linux/http/netgear_dgn1000b_setup_exec",
@@ -77730,7 +77730,7 @@
7773077730
"CMD",
7773177731
"Linux mipsbe Payload"
7773277732
],
77733-
"mod_time": "2020-10-02 17:38:06 +0000",
77733+
"mod_time": "2024-07-26 17:30:25 +0000",
7773477734
"path": "/modules/exploits/linux/http/netgear_dgn2200b_pppoe_exec.rb",
7773577735
"is_install_path": true,
7773677736
"ref_name": "linux/http/netgear_dgn2200b_pppoe_exec",
@@ -83221,7 +83221,7 @@
8322183221
"targets": [
8322283222
"Automatic"
8322383223
],
83224-
"mod_time": "2022-03-11 12:17:30 +0000",
83224+
"mod_time": "2024-09-05 08:49:32 +0000",
8322583225
"path": "/modules/exploits/linux/http/vestacp_exec.rb",
8322683226
"is_install_path": true,
8322783227
"ref_name": "linux/http/vestacp_exec",
@@ -93255,7 +93255,7 @@
9325593255
"targets": [
9325693256
"Linux x86"
9325793257
],
93258-
"mod_time": "2023-01-04 14:45:58 +0000",
93258+
"mod_time": "2024-07-26 17:30:25 +0000",
9325993259
"path": "/modules/exploits/linux/smtp/exim4_dovecot_exec.rb",
9326093260
"is_install_path": true,
9326193261
"ref_name": "linux/smtp/exim4_dovecot_exec",
@@ -100063,7 +100063,7 @@
100063100063
"targets": [
100064100064
"Bassmaster <= 1.5.1"
100065100065
],
100066-
"mod_time": "2020-10-02 17:38:06 +0000",
100066+
"mod_time": "2024-07-26 17:30:25 +0000",
100067100067
"path": "/modules/exploits/multi/http/bassmaster_js_injection.rb",
100068100068
"is_install_path": true,
100069100069
"ref_name": "multi/http/bassmaster_js_injection",
@@ -106532,7 +106532,7 @@
106532106532
"Unix CMD",
106533106533
"Linux Payload"
106534106534
],
106535-
"mod_time": "2022-03-11 12:08:51 +0000",
106535+
"mod_time": "2024-07-26 17:30:25 +0000",
106536106536
"path": "/modules/exploits/multi/http/mutiny_subnetmask_exec.rb",
106537106537
"is_install_path": true,
106538106538
"ref_name": "multi/http/mutiny_subnetmask_exec",
@@ -109785,7 +109785,7 @@
109785109785
"targets": [
109786109786
"Ruby on Rails 4.0.8 July 2, 2014"
109787109787
],
109788-
"mod_time": "2020-10-02 17:38:06 +0000",
109788+
"mod_time": "2024-07-26 17:30:25 +0000",
109789109789
"path": "/modules/exploits/multi/http/rails_dynamic_render_code_exec.rb",
109790109790
"is_install_path": true,
109791109791
"ref_name": "multi/http/rails_dynamic_render_code_exec",
@@ -111785,7 +111785,7 @@
111785111785
"Windows",
111786111786
"Linux"
111787111787
],
111788-
"mod_time": "2021-10-06 13:43:31 +0000",
111788+
"mod_time": "2024-07-26 17:30:25 +0000",
111789111789
"path": "/modules/exploits/multi/http/struts_default_action_mapper.rb",
111790111790
"is_install_path": true,
111791111791
"ref_name": "multi/http/struts_default_action_mapper",
@@ -112868,7 +112868,7 @@
112868112868
"targets": [
112869112869
"Trend Micro Threat Discovery Appliance 2.6.1062r1"
112870112870
],
112871-
"mod_time": "2020-10-02 17:38:06 +0000",
112871+
"mod_time": "2024-07-26 17:30:25 +0000",
112872112872
"path": "/modules/exploits/multi/http/trendmicro_threat_discovery_admin_sys_time_cmdi.rb",
112873112873
"is_install_path": true,
112874112874
"ref_name": "multi/http/trendmicro_threat_discovery_admin_sys_time_cmdi",
@@ -116861,7 +116861,7 @@
116861116861
"Linux (Command)",
116862116862
"AIX (Command)"
116863116863
],
116864-
"mod_time": "2023-02-08 15:46:07 +0000",
116864+
"mod_time": "2024-09-05 08:49:32 +0000",
116865116865
"path": "/modules/exploits/multi/misc/ibm_tm1_unauth_rce.rb",
116866116866
"is_install_path": true,
116867116867
"ref_name": "multi/misc/ibm_tm1_unauth_rce",
@@ -119290,7 +119290,7 @@
119290119290
"Linux",
119291119291
"Windows Universal"
119292119292
],
119293-
"mod_time": "2020-10-02 17:38:06 +0000",
119293+
"mod_time": "2024-07-26 17:30:25 +0000",
119294119294
"path": "/modules/exploits/multi/sap/sap_mgmt_con_osexec_payload.rb",
119295119295
"is_install_path": true,
119296119296
"ref_name": "multi/sap/sap_mgmt_con_osexec_payload",
@@ -166383,7 +166383,7 @@
166383166383
"targets": [
166384166384
"Windows Command"
166385166385
],
166386-
"mod_time": "2024-07-24 16:42:43 +0000",
166386+
"mod_time": "2024-09-05 08:49:32 +0000",
166387166387
"path": "/modules/exploits/windows/http/manageengine_adaudit_plus_cve_2022_28219.rb",
166388166388
"is_install_path": true,
166389166389
"ref_name": "windows/http/manageengine_adaudit_plus_cve_2022_28219",

0 commit comments

Comments
 (0)