Skip to content

Commit

Permalink
Update Metasploit database
Browse files Browse the repository at this point in the history
  • Loading branch information
m-1-k-3 authored Nov 24, 2024
1 parent 94258b7 commit 4b6d02b
Showing 1 changed file with 8 additions and 0 deletions.
8 changes: 8 additions & 0 deletions config/msf_cve-db.txt
Original file line number Diff line number Diff line change
Expand Up @@ -441,6 +441,7 @@
/modules/auxiliary/scanner/http/smt_ipmi_static_cert_scanner.rb:CVE-2013-3619
/modules/auxiliary/scanner/http/springcloud_directory_traversal.rb:CVE-2020-5410
/modules/auxiliary/scanner/http/springcloud_traversal.rb:CVE-2019-3799
/modules/auxiliary/scanner/http/strapi_3_password_reset.rb:CVE-2019-18818
/modules/auxiliary/scanner/http/support_center_plus_directory_traversal.rb:CVE-2014-100002
/modules/auxiliary/scanner/http/sybase_easerver_traversal.rb:CVE-2011-2474
/modules/auxiliary/scanner/http/symantec_brightmail_logfile.rb:CVE-2012-4347
Expand Down Expand Up @@ -814,6 +815,8 @@
/modules/exploits/linux/http/ivanti_csa_unauth_rce_cve_2021_44529.rb:CVE-2021-44529
/modules/exploits/linux/http/ivanti_sentry_misc_log_service.rb:CVE-2023-38035
/modules/exploits/linux/http/jenkins_cli_deserialization.rb:CVE-2017-1000353
/modules/exploits/linux/http/judge0_sandbox_escape_cve_2024_28189.rb:CVE-2024-28185
/modules/exploits/linux/http/judge0_sandbox_escape_cve_2024_28189.rb:CVE-2024-28189
/modules/exploits/linux/http/kafka_ui_unauth_rce_cve_2023_52251.rb:CVE-2023-52251
/modules/exploits/linux/http/kaltura_unserialize_cookie_rce.rb:CVE-2017-14143
/modules/exploits/linux/http/kibana_timelion_prototype_pollution_rce.rb:CVE-2019-7609
Expand Down Expand Up @@ -1523,6 +1526,10 @@
/modules/exploits/multi/misc/bmc_server_automation_rscd_nsh_rce.rb:CVE-2016-1543
/modules/exploits/multi/misc/calibre_exec.rb:CVE-2024-6782
/modules/exploits/multi/misc/claymore_dual_miner_remote_manager_rce.rb:CVE-2018-1000049
/modules/exploits/multi/misc/cups_ipp_remote_code_execution.rb:CVE-2024-47076
/modules/exploits/multi/misc/cups_ipp_remote_code_execution.rb:CVE-2024-47175
/modules/exploits/multi/misc/cups_ipp_remote_code_execution.rb:CVE-2024-47176
/modules/exploits/multi/misc/cups_ipp_remote_code_execution.rb:CVE-2024-47177
/modules/exploits/multi/misc/hp_vsa_exec.rb:CVE-2012-4361
/modules/exploits/multi/misc/ibm_tm1_unauth_rce.rb:CVE-2019-4716
/modules/exploits/multi/misc/java_jmx_server.rb:CVE-2015-2342
Expand Down Expand Up @@ -2598,6 +2605,7 @@
/modules/exploits/windows/misc/ibm_tsm_cad_ping.rb:CVE-2009-3853
/modules/exploits/windows/misc/ibm_tsm_rca_dicugetidentify.rb:CVE-2008-4828
/modules/exploits/windows/misc/ibm_websphere_java_deserialize.rb:CVE-2015-7450
/modules/exploits/windows/misc/ivanti_agent_portal_cmdexec.rb:CVE-2023-28324
/modules/exploits/windows/misc/ivanti_avalanche_mdm_bof.rb:CVE-2023-32560
/modules/exploits/windows/misc/landesk_aolnsrvr.rb:CVE-2007-1674
/modules/exploits/windows/misc/lianja_db_net.rb:CVE-2013-3563
Expand Down

0 comments on commit 4b6d02b

Please sign in to comment.