Skip to content

Commit 179a545

Browse files
Remove false positive references
1 parent 3b727fb commit 179a545

19 files changed

+19
-41
lines changed

modules/exploits/linux/http/asuswrt_lan_rce.rb

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,8 +33,7 @@ def initialize(info = {})
3333
['URL', 'https://raw.githubusercontent.com/pedrib/PoC/master/advisories/asuswrt-lan-rce.txt'],
3434
['URL', 'https://seclists.org/fulldisclosure/2018/Jan/78'],
3535
['CVE', '2018-5999'],
36-
['CVE', '2018-6000'],
37-
['ATT&CK', Mitre::Attack::Technique::T1021_REMOTE_SERVICES]
36+
['CVE', '2018-6000']
3837
],
3938
'Targets' => [
4039
[

modules/exploits/linux/http/beyondtrust_pra_rs_unauth_rce.rb

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,8 +29,7 @@ def initialize(info = {})
2929
['CVE', '2025-1094'], # The SQL injection in PostgreSQL code.
3030
['URL', 'http://web.archive.org/web/20241226144006/https://www.beyondtrust.com/trust-center/security-advisories/bt24-10'], # BeyondTrust Advisory
3131
['URL', 'https://www.postgresql.org/support/security/CVE-2025-1094/'], # PostgreSQL Advisory
32-
['URL', 'https://attackerkb.com/topics/G5s8ZWAbYH/cve-2024-12356/rapid7-analysis'], # Rapid7 Analysis
33-
['ATT&CK', Mitre::Attack::Technique::T1021_REMOTE_SERVICES]
32+
['URL', 'https://attackerkb.com/topics/G5s8ZWAbYH/cve-2024-12356/rapid7-analysis'] # Rapid7 Analysis
3433
],
3534
'DisclosureDate' => '2024-12-16',
3635
'Platform' => [ 'linux', 'unix' ],

modules/exploits/linux/misc/igel_command_injection.rb

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -35,9 +35,7 @@ def initialize(info = {})
3535
'References' => [
3636
[ 'CVE', '2025-34082' ],
3737
[ 'URL', 'https://kb.igel.com/securitysafety/en/isn-2021-01-igel-os-remote-command-execution-vulnerability-41449239.html' ],
38-
[ 'URL', 'https://www.igel.com/wp-content/uploads/2021/02/lxos_11.04.270.txt' ],
39-
[ 'ATT&CK', Mitre::Attack::Technique::T1021_REMOTE_SERVICES ], # Telnet service
40-
[ 'ATT&CK', Mitre::Attack::Technique::T1021_005_VNC ]
38+
[ 'URL', 'https://www.igel.com/wp-content/uploads/2021/02/lxos_11.04.270.txt' ]
4139
],
4240
'Platform' => ['linux'],
4341
'Arch' => [ARCH_X86, ARCH_X64],

modules/exploits/linux/ssh/ssh_erlangotp_rce.rb

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,8 +37,7 @@ def initialize(info = {})
3737
['CVE', '2025-32433'],
3838
['URL', 'https://x.com/Horizon3Attack/status/1912945580902334793'],
3939
['URL', 'https://platformsecurity.com/blog/CVE-2025-32433-poc'],
40-
['URL', 'https://github.com/ProDefense/CVE-2025-32433'],
41-
['ATT&CK', Mitre::Attack::Technique::T1021_004_SSH]
40+
['URL', 'https://github.com/ProDefense/CVE-2025-32433']
4241
],
4342
'Platform' => ['linux', 'unix'],
4443
'Arch' => [ARCH_CMD],

modules/exploits/multi/http/atlassian_confluence_rce_cve_2024_21683.rb

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,8 +34,7 @@ def initialize(info = {})
3434
['CVE', '2024-21683'],
3535
['URL', 'https://jira.atlassian.com/browse/CONFSERVER-95832'],
3636
['URL', 'https://realalphaman.substack.com/p/quick-note-about-cve-2024-21683-authenticated'],
37-
['URL', 'https://github.com/W01fh4cker/CVE-2024-21683-RCE'],
38-
['ATT&CK', Mitre::Attack::Technique::T1021_REMOTE_SERVICES]
37+
['URL', 'https://github.com/W01fh4cker/CVE-2024-21683-RCE']
3938
],
4039
'DisclosureDate' => '2024-05-21',
4140
'Privileged' => false, # `NT AUTHORITY\NETWORK SERVICE` on Windows by default, `confluence` on Linux by default.

modules/exploits/multi/http/connectwise_screenconnect_rce_cve_2024_1709.rb

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,8 +31,7 @@ def initialize(info = {})
3131
['CVE', '2024-1709'], # Auth bypass to create admin account.
3232
['URL', 'https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8'], # Vendor Advisory
3333
['URL', 'https://github.com/watchtowrlabs/connectwise-screenconnect_auth-bypass-add-user-poc/'], # Auth Bypass PoC
34-
['URL', 'https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass'], # Analysis of both CVEs
35-
['ATT&CK', Mitre::Attack::Technique::T1021_REMOTE_SERVICES]
34+
['URL', 'https://www.huntress.com/blog/a-catastrophe-for-control-understanding-the-screenconnect-authentication-bypass'] # Analysis of both CVEs
3635
],
3736
'DisclosureDate' => '2024-02-19',
3837
'Platform' => %w[win linux unix],

modules/exploits/multi/misc/bmc_server_automation_rscd_nsh_rce.rb

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,8 +31,7 @@ def initialize(info = {})
3131
['URL', 'https://nickbloor.co.uk/2018/01/01/rce-with-bmc-server-automation/'],
3232
['URL', 'https://nickbloor.co.uk/2018/01/08/improving-the-bmc-rscd-rce-exploit/'],
3333
['CVE', '2016-1542'],
34-
['CVE', '2016-1543'],
35-
['ATT&CK', Mitre::Attack::Technique::T1021_REMOTE_SERVICES]
34+
['CVE', '2016-1543']
3635
],
3736
'DisclosureDate' => '2016-03-16',
3837
'Privileged' => false,

modules/exploits/osx/http/remote_for_mac_rce.rb

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,7 @@ def initialize(info = {})
2222
'Author' => ['Chokri Hammedi (@blue0x1)'],
2323
'References' => [
2424
['CVE', '2025-34089'],
25-
['PACKETSTORM', '195347'],
26-
['ATT&CK', Mitre::Attack::Technique::T1021_REMOTE_SERVICES]
25+
['PACKETSTORM', '195347']
2726
],
2827
'DisclosureDate' => '2025-05-27',
2928
'Platform' => ['unix', 'osx'],

modules/exploits/solaris/telnet/fuser.rb

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,7 @@ def initialize(info = {})
2222
'References' => [
2323
[ 'CVE', '2007-0882' ],
2424
[ 'OSVDB', '31881'],
25-
[ 'BID', '22512' ],
26-
[ 'ATT&CK', Mitre::Attack::Technique::T1021_REMOTE_SERVICES ],
25+
[ 'BID', '22512' ]
2726
],
2827
'Privileged' => false,
2928
'Platform' => %w[solaris unix],

modules/exploits/solaris/telnet/ttyprompt.rb

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,7 @@ def initialize(info = {})
2222
'References' => [
2323
['CVE', '2001-0797'],
2424
['OSVDB', '690'],
25-
['BID', '5531'],
26-
['ATT&CK', Mitre::Attack::Technique::T1021_REMOTE_SERVICES],
25+
['BID', '5531']
2726
],
2827
'Privileged' => false,
2928
'Platform' => %w[solaris unix],

0 commit comments

Comments
 (0)