diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index ed2d00dd1f..ff7596d25e 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -69995,7 +69995,7 @@ "targets": [ "Zimbra Collaboration Suite" ], - "mod_time": "2022-08-04 08:24:32 +0000", + "mod_time": "2022-08-17 10:19:36 +0000", "path": "/modules/exploits/linux/http/zimbra_unrar_cve_2022_30333.rb", "is_install_path": true, "ref_name": "linux/http/zimbra_unrar_cve_2022_30333", @@ -133662,7 +133662,8 @@ "type": "exploit", "author": [ "nao sec", - "mekhalleh (RAMELLA Sébastien)" + "mekhalleh (RAMELLA Sébastien)", + "bwatters-r7" ], "description": "This module generates a malicious Microsoft Word document that when loaded, will leverage the remote template\n feature to fetch an `HTML` document and then use the `ms-msdt` scheme to execute `PowerShell` code.", "references": [ @@ -133686,7 +133687,7 @@ "targets": [ "Microsoft Office Word" ], - "mod_time": "2022-06-02 00:58:20 +0000", + "mod_time": "2022-08-25 15:56:39 +0000", "path": "/modules/exploits/windows/fileformat/word_msdtjs_rce.rb", "is_install_path": true, "ref_name": "windows/fileformat/word_msdtjs_rce",