Skip to content

Commit 8648398

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 29088b4 commit 8648398

File tree

1 file changed

+49
-49
lines changed

1 file changed

+49
-49
lines changed

db/modules_metadata_base.json

Lines changed: 49 additions & 49 deletions
Original file line numberDiff line numberDiff line change
@@ -188659,55 +188659,6 @@
188659188659
"needs_cleanup": true,
188660188660
"actions": []
188661188661
},
188662-
"exploit_windows/local/linqpad_deserialization_persistence": {
188663-
"name": "LINQPad Deserialization Exploit",
188664-
"fullname": "exploit/windows/local/linqpad_deserialization_persistence",
188665-
"aliases": [],
188666-
"rank": 300,
188667-
"disclosure_date": "2024-12-03",
188668-
"type": "exploit",
188669-
"author": [
188670-
"msutovsky-r7 <[email protected]>",
188671-
"James Williams"
188672-
],
188673-
"description": "This module exploits a bug in LINQPad up to version 5.52.00. The bug is only exploitable in paid version of software. The core of a bug is cache file containing deserialized data, which attacker can overwrite with malicious payload. The data gets deserialized every time the app restarts.",
188674-
"references": [
188675-
"URL-https://trustedsec.com/blog/discovering-a-deserialization-vulnerability-in-linqpad",
188676-
"CVE-2024-53326"
188677-
],
188678-
"platform": "Windows",
188679-
"arch": "",
188680-
"rport": null,
188681-
"autofilter_ports": [],
188682-
"autofilter_services": [],
188683-
"targets": [
188684-
"Windows"
188685-
],
188686-
"mod_time": "2025-10-19 10:05:48 +0000",
188687-
"path": "/modules/exploits/windows/local/linqpad_deserialization_persistence.rb",
188688-
"is_install_path": true,
188689-
"ref_name": "windows/local/linqpad_deserialization_persistence",
188690-
"check": true,
188691-
"post_auth": false,
188692-
"default_credential": false,
188693-
"notes": {
188694-
"Stability": [
188695-
"crash-safe"
188696-
],
188697-
"Reliability": [
188698-
"repeatable-session"
188699-
],
188700-
"SideEffects": [
188701-
"artifacts-on-disk"
188702-
]
188703-
},
188704-
"session_types": [
188705-
"shell",
188706-
"meterpreter"
188707-
],
188708-
"needs_cleanup": null,
188709-
"actions": []
188710-
},
188711188662
"exploit_windows/local/microfocus_operations_privesc": {
188712188663
"name": "Micro Focus Operations Bridge Manager / Reporter Local Privilege Escalation",
188713188664
"fullname": "exploit/windows/local/microfocus_operations_privesc",
@@ -199395,6 +199346,55 @@
199395199346
"needs_cleanup": null,
199396199347
"actions": []
199397199348
},
199349+
"exploit_windows/persistence/linqpad_deserialization": {
199350+
"name": "LINQPad Deserialization",
199351+
"fullname": "exploit/windows/persistence/linqpad_deserialization",
199352+
"aliases": [],
199353+
"rank": 300,
199354+
"disclosure_date": "2024-12-03",
199355+
"type": "exploit",
199356+
"author": [
199357+
"msutovsky-r7 <[email protected]>",
199358+
"James Williams"
199359+
],
199360+
"description": "This module exploits a bug in LIQPad up to version 5.48.00. The bug is only exploitable in paid version of software. The core of a bug is cache file containing deserialized data, which attacker can overwrite with malicious payload. The data gets deserialized every time the app restarts.",
199361+
"references": [
199362+
"URL-https://trustedsec.com/blog/discovering-a-deserialization-vulnerability-in-linqpad",
199363+
"CVE-2024-53326"
199364+
],
199365+
"platform": "Windows",
199366+
"arch": "",
199367+
"rport": null,
199368+
"autofilter_ports": [],
199369+
"autofilter_services": [],
199370+
"targets": [
199371+
"Windows"
199372+
],
199373+
"mod_time": "2025-11-11 11:22:31 +0000",
199374+
"path": "/modules/exploits/windows/persistence/linqpad_deserialization.rb",
199375+
"is_install_path": true,
199376+
"ref_name": "windows/persistence/linqpad_deserialization",
199377+
"check": true,
199378+
"post_auth": false,
199379+
"default_credential": false,
199380+
"notes": {
199381+
"Stability": [
199382+
"crash-safe"
199383+
],
199384+
"Reliability": [
199385+
"repeatable-session"
199386+
],
199387+
"SideEffects": [
199388+
"artifacts-on-disk"
199389+
]
199390+
},
199391+
"session_types": [
199392+
"shell",
199393+
"meterpreter"
199394+
],
199395+
"needs_cleanup": null,
199396+
"actions": []
199397+
},
199398199398
"exploit_windows/persistence/registry": {
199399199399
"name": "Windows Registry Only Persistence",
199400199400
"fullname": "exploit/windows/persistence/registry",

0 commit comments

Comments
 (0)