automatic module_metadata_base.json update
This commit is contained in:
parent
6a71daac44
commit
1b985447c5
|
@ -69995,7 +69995,7 @@
|
|||
"targets": [
|
||||
"Zimbra Collaboration Suite"
|
||||
],
|
||||
"mod_time": "2022-08-04 08:24:32 +0000",
|
||||
"mod_time": "2022-08-17 10:19:36 +0000",
|
||||
"path": "/modules/exploits/linux/http/zimbra_unrar_cve_2022_30333.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "linux/http/zimbra_unrar_cve_2022_30333",
|
||||
|
@ -133662,7 +133662,8 @@
|
|||
"type": "exploit",
|
||||
"author": [
|
||||
"nao sec",
|
||||
"mekhalleh (RAMELLA Sébastien)"
|
||||
"mekhalleh (RAMELLA Sébastien)",
|
||||
"bwatters-r7"
|
||||
],
|
||||
"description": "This module generates a malicious Microsoft Word document that when loaded, will leverage the remote template\n feature to fetch an `HTML` document and then use the `ms-msdt` scheme to execute `PowerShell` code.",
|
||||
"references": [
|
||||
|
@ -133686,7 +133687,7 @@
|
|||
"targets": [
|
||||
"Microsoft Office Word"
|
||||
],
|
||||
"mod_time": "2022-06-02 00:58:20 +0000",
|
||||
"mod_time": "2022-08-25 15:56:39 +0000",
|
||||
"path": "/modules/exploits/windows/fileformat/word_msdtjs_rce.rb",
|
||||
"is_install_path": true,
|
||||
"ref_name": "windows/fileformat/word_msdtjs_rce",
|
||||
|
|
Loading…
Reference in New Issue