|
24023 | 24023 | "https"
|
24024 | 24024 | ],
|
24025 | 24025 | "targets": null,
|
24026 |
| - "mod_time": "2024-07-18 11:56:22 +0000", |
| 24026 | + "mod_time": "2024-07-19 12:33:13 +0000", |
24027 | 24027 | "path": "/modules/auxiliary/gather/magento_xxe_cve_2024_34102.rb",
|
24028 | 24028 | "is_install_path": true,
|
24029 | 24029 | "ref_name": "gather/magento_xxe_cve_2024_34102",
|
|
71102 | 71102 | "CMD",
|
71103 | 71103 | "Linux mipsel Payload"
|
71104 | 71104 | ],
|
71105 |
| - "mod_time": "2020-10-02 17:38:06 +0000", |
| 71105 | + "mod_time": "2024-07-26 17:30:25 +0000", |
71106 | 71106 | "path": "/modules/exploits/linux/http/dlink_diagnostic_exec_noauth.rb",
|
71107 | 71107 | "is_install_path": true,
|
71108 | 71108 | "ref_name": "linux/http/dlink_diagnostic_exec_noauth",
|
|
71260 | 71260 | "CMD",
|
71261 | 71261 | "Linux mipsel Payload"
|
71262 | 71262 | ],
|
71263 |
| - "mod_time": "2020-10-02 17:38:06 +0000", |
| 71263 | + "mod_time": "2024-07-26 17:30:25 +0000", |
71264 | 71264 | "path": "/modules/exploits/linux/http/dlink_dir615_up_exec.rb",
|
71265 | 71265 | "is_install_path": true,
|
71266 | 71266 | "ref_name": "linux/http/dlink_dir615_up_exec",
|
|
71746 | 71746 | "Dlink DIR-818 / 822 / 823 / 850 [MIPS]",
|
71747 | 71747 | "Dlink DIR-868 (rev. B and C) / 880 / 885 / 890 / 895 [ARM]"
|
71748 | 71748 | ],
|
71749 |
| - "mod_time": "2020-10-02 17:38:06 +0000", |
| 71749 | + "mod_time": "2024-09-05 08:49:32 +0000", |
71750 | 71750 | "path": "/modules/exploits/linux/http/dlink_hnap_login_bof.rb",
|
71751 | 71751 | "is_install_path": true,
|
71752 | 71752 | "ref_name": "linux/http/dlink_hnap_login_bof",
|
|
75856 | 75856 | "CMD",
|
75857 | 75857 | "Linux mipsel Payload"
|
75858 | 75858 | ],
|
75859 |
| - "mod_time": "2020-10-02 17:38:06 +0000", |
| 75859 | + "mod_time": "2024-07-26 17:30:25 +0000", |
75860 | 75860 | "path": "/modules/exploits/linux/http/linksys_e1500_apply_exec.rb",
|
75861 | 75861 | "is_install_path": true,
|
75862 | 75862 | "ref_name": "linux/http/linksys_e1500_apply_exec",
|
|
76078 | 76078 | "CMD",
|
76079 | 76079 | "Linux mipsel Payload"
|
76080 | 76080 | ],
|
76081 |
| - "mod_time": "2020-10-02 17:38:06 +0000", |
| 76081 | + "mod_time": "2024-07-26 17:30:25 +0000", |
76082 | 76082 | "path": "/modules/exploits/linux/http/linksys_wrt54gl_apply_exec.rb",
|
76083 | 76083 | "is_install_path": true,
|
76084 | 76084 | "ref_name": "linux/http/linksys_wrt54gl_apply_exec",
|
|
77676 | 77676 | "CMD",
|
77677 | 77677 | "Linux mipsbe Payload"
|
77678 | 77678 | ],
|
77679 |
| - "mod_time": "2020-10-02 17:38:06 +0000", |
| 77679 | + "mod_time": "2024-07-26 17:30:25 +0000", |
77680 | 77680 | "path": "/modules/exploits/linux/http/netgear_dgn1000b_setup_exec.rb",
|
77681 | 77681 | "is_install_path": true,
|
77682 | 77682 | "ref_name": "linux/http/netgear_dgn1000b_setup_exec",
|
|
77730 | 77730 | "CMD",
|
77731 | 77731 | "Linux mipsbe Payload"
|
77732 | 77732 | ],
|
77733 |
| - "mod_time": "2020-10-02 17:38:06 +0000", |
| 77733 | + "mod_time": "2024-07-26 17:30:25 +0000", |
77734 | 77734 | "path": "/modules/exploits/linux/http/netgear_dgn2200b_pppoe_exec.rb",
|
77735 | 77735 | "is_install_path": true,
|
77736 | 77736 | "ref_name": "linux/http/netgear_dgn2200b_pppoe_exec",
|
|
83221 | 83221 | "targets": [
|
83222 | 83222 | "Automatic"
|
83223 | 83223 | ],
|
83224 |
| - "mod_time": "2022-03-11 12:17:30 +0000", |
| 83224 | + "mod_time": "2024-09-05 08:49:32 +0000", |
83225 | 83225 | "path": "/modules/exploits/linux/http/vestacp_exec.rb",
|
83226 | 83226 | "is_install_path": true,
|
83227 | 83227 | "ref_name": "linux/http/vestacp_exec",
|
|
93255 | 93255 | "targets": [
|
93256 | 93256 | "Linux x86"
|
93257 | 93257 | ],
|
93258 |
| - "mod_time": "2023-01-04 14:45:58 +0000", |
| 93258 | + "mod_time": "2024-07-26 17:30:25 +0000", |
93259 | 93259 | "path": "/modules/exploits/linux/smtp/exim4_dovecot_exec.rb",
|
93260 | 93260 | "is_install_path": true,
|
93261 | 93261 | "ref_name": "linux/smtp/exim4_dovecot_exec",
|
@@ -100063,7 +100063,7 @@
|
100063 | 100063 | "targets": [
|
100064 | 100064 | "Bassmaster <= 1.5.1"
|
100065 | 100065 | ],
|
100066 |
| - "mod_time": "2020-10-02 17:38:06 +0000", |
| 100066 | + "mod_time": "2024-07-26 17:30:25 +0000", |
100067 | 100067 | "path": "/modules/exploits/multi/http/bassmaster_js_injection.rb",
|
100068 | 100068 | "is_install_path": true,
|
100069 | 100069 | "ref_name": "multi/http/bassmaster_js_injection",
|
@@ -106532,7 +106532,7 @@
|
106532 | 106532 | "Unix CMD",
|
106533 | 106533 | "Linux Payload"
|
106534 | 106534 | ],
|
106535 |
| - "mod_time": "2022-03-11 12:08:51 +0000", |
| 106535 | + "mod_time": "2024-07-26 17:30:25 +0000", |
106536 | 106536 | "path": "/modules/exploits/multi/http/mutiny_subnetmask_exec.rb",
|
106537 | 106537 | "is_install_path": true,
|
106538 | 106538 | "ref_name": "multi/http/mutiny_subnetmask_exec",
|
@@ -109785,7 +109785,7 @@
|
109785 | 109785 | "targets": [
|
109786 | 109786 | "Ruby on Rails 4.0.8 July 2, 2014"
|
109787 | 109787 | ],
|
109788 |
| - "mod_time": "2020-10-02 17:38:06 +0000", |
| 109788 | + "mod_time": "2024-07-26 17:30:25 +0000", |
109789 | 109789 | "path": "/modules/exploits/multi/http/rails_dynamic_render_code_exec.rb",
|
109790 | 109790 | "is_install_path": true,
|
109791 | 109791 | "ref_name": "multi/http/rails_dynamic_render_code_exec",
|
@@ -111785,7 +111785,7 @@
|
111785 | 111785 | "Windows",
|
111786 | 111786 | "Linux"
|
111787 | 111787 | ],
|
111788 |
| - "mod_time": "2021-10-06 13:43:31 +0000", |
| 111788 | + "mod_time": "2024-07-26 17:30:25 +0000", |
111789 | 111789 | "path": "/modules/exploits/multi/http/struts_default_action_mapper.rb",
|
111790 | 111790 | "is_install_path": true,
|
111791 | 111791 | "ref_name": "multi/http/struts_default_action_mapper",
|
@@ -112868,7 +112868,7 @@
|
112868 | 112868 | "targets": [
|
112869 | 112869 | "Trend Micro Threat Discovery Appliance 2.6.1062r1"
|
112870 | 112870 | ],
|
112871 |
| - "mod_time": "2020-10-02 17:38:06 +0000", |
| 112871 | + "mod_time": "2024-07-26 17:30:25 +0000", |
112872 | 112872 | "path": "/modules/exploits/multi/http/trendmicro_threat_discovery_admin_sys_time_cmdi.rb",
|
112873 | 112873 | "is_install_path": true,
|
112874 | 112874 | "ref_name": "multi/http/trendmicro_threat_discovery_admin_sys_time_cmdi",
|
@@ -116861,7 +116861,7 @@
|
116861 | 116861 | "Linux (Command)",
|
116862 | 116862 | "AIX (Command)"
|
116863 | 116863 | ],
|
116864 |
| - "mod_time": "2023-02-08 15:46:07 +0000", |
| 116864 | + "mod_time": "2024-09-05 08:49:32 +0000", |
116865 | 116865 | "path": "/modules/exploits/multi/misc/ibm_tm1_unauth_rce.rb",
|
116866 | 116866 | "is_install_path": true,
|
116867 | 116867 | "ref_name": "multi/misc/ibm_tm1_unauth_rce",
|
@@ -119290,7 +119290,7 @@
|
119290 | 119290 | "Linux",
|
119291 | 119291 | "Windows Universal"
|
119292 | 119292 | ],
|
119293 |
| - "mod_time": "2020-10-02 17:38:06 +0000", |
| 119293 | + "mod_time": "2024-07-26 17:30:25 +0000", |
119294 | 119294 | "path": "/modules/exploits/multi/sap/sap_mgmt_con_osexec_payload.rb",
|
119295 | 119295 | "is_install_path": true,
|
119296 | 119296 | "ref_name": "multi/sap/sap_mgmt_con_osexec_payload",
|
@@ -166383,7 +166383,7 @@
|
166383 | 166383 | "targets": [
|
166384 | 166384 | "Windows Command"
|
166385 | 166385 | ],
|
166386 |
| - "mod_time": "2024-07-24 16:42:43 +0000", |
| 166386 | + "mod_time": "2024-09-05 08:49:32 +0000", |
166387 | 166387 | "path": "/modules/exploits/windows/http/manageengine_adaudit_plus_cve_2022_28219.rb",
|
166388 | 166388 | "is_install_path": true,
|
166389 | 166389 | "ref_name": "windows/http/manageengine_adaudit_plus_cve_2022_28219",
|
|
0 commit comments