|
8833 | 8833 | "Michael Heinzl",
|
8834 | 8834 | "Tenable"
|
8835 | 8835 | ],
|
8836 |
| - "description": "This module exploits a path traversal vulnerability (CVE-2023-2915) in ThinManager <= v13.1.0 to delete arbitrary files from the system.\n\n The affected service listens by default on TCP port 2031 and runs in the context of NT AUTHORITY\\SYSTEM.", |
| 8836 | + "description": "This module exploits a path traversal vulnerability (CVE-2023-2915) in\n ThinManager <= v13.1.0 to delete arbitrary files from the system.\n The affected service listens by default on TCP port 2031 and runs in the\n context of NT AUTHORITY\\SYSTEM.", |
8837 | 8837 | "references": [
|
8838 | 8838 | "CVE-2023-2915",
|
8839 | 8839 | "URL-https://www.tenable.com/security/research/tra-2023-28",
|
|
8845 | 8845 | "autofilter_ports": [],
|
8846 | 8846 | "autofilter_services": [],
|
8847 | 8847 | "targets": null,
|
8848 |
| - "mod_time": "2025-06-05 02:57:40 +0000", |
| 8848 | + "mod_time": "2025-06-09 09:17:11 +0000", |
8849 | 8849 | "path": "/modules/auxiliary/admin/networking/thinmanager_traversal_delete.rb",
|
8850 | 8850 | "is_install_path": true,
|
8851 | 8851 | "ref_name": "admin/networking/thinmanager_traversal_delete",
|
|
8876 | 8876 | "Michael Heinzl",
|
8877 | 8877 | "Tenable"
|
8878 | 8878 | ],
|
8879 |
| - "description": "This module exploits a path traversal vulnerability (CVE-2023-27855 ) in ThinManager <= v13.0.1 to upload arbitrary files to the target system.\n\n The affected service listens by default on TCP port 2031 and runs in the context of NT AUTHORITY\\SYSTEM.", |
| 8879 | + "description": "This module exploits a path traversal vulnerability (CVE-2023-27855) in\n ThinManager <= v13.0.1 to upload arbitrary files to the target system.\n The affected service listens by default on TCP port 2031 and runs in the\n context of NT AUTHORITY\\SYSTEM.", |
8880 | 8880 | "references": [
|
8881 | 8881 | "CVE-2023-27855",
|
8882 | 8882 | "URL-https://www.tenable.com/security/research/tra-2023-13",
|
|
8888 | 8888 | "autofilter_ports": [],
|
8889 | 8889 | "autofilter_services": [],
|
8890 | 8890 | "targets": null,
|
8891 |
| - "mod_time": "2025-06-06 10:06:21 +0000", |
| 8891 | + "mod_time": "2025-06-09 09:17:11 +0000", |
8892 | 8892 | "path": "/modules/auxiliary/admin/networking/thinmanager_traversal_upload.rb",
|
8893 | 8893 | "is_install_path": true,
|
8894 | 8894 | "ref_name": "admin/networking/thinmanager_traversal_upload",
|
|
8920 | 8920 | "Michael Heinzl",
|
8921 | 8921 | "Tenable"
|
8922 | 8922 | ],
|
8923 |
| - "description": "This module exploits a path traversal vulnerability (CVE-2023-2917) in ThinManager <= v13.1.0 to upload arbitrary files to the target system.\n\n The affected service listens by default on TCP port 2031 and runs in the context of NT AUTHORITY\\SYSTEM.", |
| 8923 | + "description": "This module exploits a path traversal vulnerability (CVE-2023-2917) in\n ThinManager <= v13.1.0 to upload arbitrary files to the target system.\n The affected service listens by default on TCP port 2031 and runs in the\n context of NT AUTHORITY\\SYSTEM.", |
8924 | 8924 | "references": [
|
8925 |
| - "CVE-2023-2917 ", |
| 8925 | + "CVE-2023-2917", |
8926 | 8926 | "URL-https://www.tenable.com/security/research/tra-2023-28",
|
8927 | 8927 | "URL-https://support.rockwellautomation.com/app/answers/answer_view/a_id/1140471"
|
8928 | 8928 | ],
|
|
8932 | 8932 | "autofilter_ports": [],
|
8933 | 8933 | "autofilter_services": [],
|
8934 | 8934 | "targets": null,
|
8935 |
| - "mod_time": "2025-05-15 21:55:27 +0000", |
| 8935 | + "mod_time": "2025-06-09 09:17:11 +0000", |
8936 | 8936 | "path": "/modules/auxiliary/admin/networking/thinmanager_traversal_upload2.rb",
|
8937 | 8937 | "is_install_path": true,
|
8938 | 8938 | "ref_name": "admin/networking/thinmanager_traversal_upload2",
|
|
26506 | 26506 | "Michael Heinzl",
|
26507 | 26507 | "Tenable"
|
26508 | 26508 | ],
|
26509 |
| - "description": "This module exploits a path traversal vulnerability (CVE-2023-27856) in ThinManager <= v13.0.1 to retrieve arbitrary files from the system.\n\n The affected service listens by default on TCP port 2031 and runs in the context of NT AUTHORITY\\SYSTEM.", |
| 26509 | + "description": "This module exploits a path traversal vulnerability (CVE-2023-27856) in\n ThinManager <= v13.0.1 to retrieve arbitrary files from the system.\n The affected service listens by default on TCP port 2031 and runs in the\n context of NT AUTHORITY\\SYSTEM.", |
26510 | 26510 | "references": [
|
26511 | 26511 | "CVE-2023-27856",
|
26512 | 26512 | "URL-https://www.tenable.com/security/research/tra-2023-13",
|
|
26518 | 26518 | "autofilter_ports": [],
|
26519 | 26519 | "autofilter_services": [],
|
26520 | 26520 | "targets": null,
|
26521 |
| - "mod_time": "2025-06-04 19:18:43 +0000", |
| 26521 | + "mod_time": "2025-06-09 09:17:11 +0000", |
26522 | 26522 | "path": "/modules/auxiliary/gather/thinmanager_traversal_download.rb",
|
26523 | 26523 | "is_install_path": true,
|
26524 | 26524 | "ref_name": "gather/thinmanager_traversal_download",
|
|
0 commit comments