@@ -188659,55 +188659,6 @@
188659188659 "needs_cleanup": true,
188660188660 "actions": []
188661188661 },
188662- "exploit_windows/local/linqpad_deserialization_persistence": {
188663- "name": "LINQPad Deserialization Exploit",
188664- "fullname": "exploit/windows/local/linqpad_deserialization_persistence",
188665- "aliases": [],
188666- "rank": 300,
188667- "disclosure_date": "2024-12-03",
188668- "type": "exploit",
188669- "author": [
188670- "msutovsky-r7 <
[email protected] >",
188671- "James Williams"
188672- ],
188673- "description": "This module exploits a bug in LINQPad up to version 5.52.00. The bug is only exploitable in paid version of software. The core of a bug is cache file containing deserialized data, which attacker can overwrite with malicious payload. The data gets deserialized every time the app restarts.",
188674- "references": [
188675- "URL-https://trustedsec.com/blog/discovering-a-deserialization-vulnerability-in-linqpad",
188676- "CVE-2024-53326"
188677- ],
188678- "platform": "Windows",
188679- "arch": "",
188680- "rport": null,
188681- "autofilter_ports": [],
188682- "autofilter_services": [],
188683- "targets": [
188684- "Windows"
188685- ],
188686- "mod_time": "2025-10-19 10:05:48 +0000",
188687- "path": "/modules/exploits/windows/local/linqpad_deserialization_persistence.rb",
188688- "is_install_path": true,
188689- "ref_name": "windows/local/linqpad_deserialization_persistence",
188690- "check": true,
188691- "post_auth": false,
188692- "default_credential": false,
188693- "notes": {
188694- "Stability": [
188695- "crash-safe"
188696- ],
188697- "Reliability": [
188698- "repeatable-session"
188699- ],
188700- "SideEffects": [
188701- "artifacts-on-disk"
188702- ]
188703- },
188704- "session_types": [
188705- "shell",
188706- "meterpreter"
188707- ],
188708- "needs_cleanup": null,
188709- "actions": []
188710- },
188711188662 "exploit_windows/local/microfocus_operations_privesc": {
188712188663 "name": "Micro Focus Operations Bridge Manager / Reporter Local Privilege Escalation",
188713188664 "fullname": "exploit/windows/local/microfocus_operations_privesc",
@@ -199395,6 +199346,55 @@
199395199346 "needs_cleanup": null,
199396199347 "actions": []
199397199348 },
199349+ "exploit_windows/persistence/linqpad_deserialization": {
199350+ "name": "LINQPad Deserialization",
199351+ "fullname": "exploit/windows/persistence/linqpad_deserialization",
199352+ "aliases": [],
199353+ "rank": 300,
199354+ "disclosure_date": "2024-12-03",
199355+ "type": "exploit",
199356+ "author": [
199357+ "msutovsky-r7 <
[email protected] >",
199358+ "James Williams"
199359+ ],
199360+ "description": "This module exploits a bug in LIQPad up to version 5.48.00. The bug is only exploitable in paid version of software. The core of a bug is cache file containing deserialized data, which attacker can overwrite with malicious payload. The data gets deserialized every time the app restarts.",
199361+ "references": [
199362+ "URL-https://trustedsec.com/blog/discovering-a-deserialization-vulnerability-in-linqpad",
199363+ "CVE-2024-53326"
199364+ ],
199365+ "platform": "Windows",
199366+ "arch": "",
199367+ "rport": null,
199368+ "autofilter_ports": [],
199369+ "autofilter_services": [],
199370+ "targets": [
199371+ "Windows"
199372+ ],
199373+ "mod_time": "2025-11-11 11:22:31 +0000",
199374+ "path": "/modules/exploits/windows/persistence/linqpad_deserialization.rb",
199375+ "is_install_path": true,
199376+ "ref_name": "windows/persistence/linqpad_deserialization",
199377+ "check": true,
199378+ "post_auth": false,
199379+ "default_credential": false,
199380+ "notes": {
199381+ "Stability": [
199382+ "crash-safe"
199383+ ],
199384+ "Reliability": [
199385+ "repeatable-session"
199386+ ],
199387+ "SideEffects": [
199388+ "artifacts-on-disk"
199389+ ]
199390+ },
199391+ "session_types": [
199392+ "shell",
199393+ "meterpreter"
199394+ ],
199395+ "needs_cleanup": null,
199396+ "actions": []
199397+ },
199398199398 "exploit_windows/persistence/registry": {
199399199399 "name": "Windows Registry Only Persistence",
199400199400 "fullname": "exploit/windows/persistence/registry",
0 commit comments