automatic module_metadata_base.json update

This commit is contained in:
Metasploit 2022-08-25 17:30:53 -05:00
parent 6a71daac44
commit 1b985447c5
No known key found for this signature in database
GPG Key ID: CDFB5FA52007B954
1 changed files with 4 additions and 3 deletions

View File

@ -69995,7 +69995,7 @@
"targets": [
"Zimbra Collaboration Suite"
],
"mod_time": "2022-08-04 08:24:32 +0000",
"mod_time": "2022-08-17 10:19:36 +0000",
"path": "/modules/exploits/linux/http/zimbra_unrar_cve_2022_30333.rb",
"is_install_path": true,
"ref_name": "linux/http/zimbra_unrar_cve_2022_30333",
@ -133662,7 +133662,8 @@
"type": "exploit",
"author": [
"nao sec",
"mekhalleh (RAMELLA Sébastien)"
"mekhalleh (RAMELLA Sébastien)",
"bwatters-r7"
],
"description": "This module generates a malicious Microsoft Word document that when loaded, will leverage the remote template\n feature to fetch an `HTML` document and then use the `ms-msdt` scheme to execute `PowerShell` code.",
"references": [
@ -133686,7 +133687,7 @@
"targets": [
"Microsoft Office Word"
],
"mod_time": "2022-06-02 00:58:20 +0000",
"mod_time": "2022-08-25 15:56:39 +0000",
"path": "/modules/exploits/windows/fileformat/word_msdtjs_rce.rb",
"is_install_path": true,
"ref_name": "windows/fileformat/word_msdtjs_rce",