Skip to content

Commit 7aebd44

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 3bf76a3 commit 7aebd44

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

db/modules_metadata_base.json

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -191378,7 +191378,10 @@
191378191378
],
191379191379
"description": "PSEvents.exe within several Panda Security products runs hourly with SYSTEM privileges.\n When run, it checks a user writable folder for certain DLL files, and if any are found\n they are automatically run.\n Vulnerable Products:\n Panda Global Protection 2016 (<=16.1.2)\n Panda Antivirus Pro 2016 (<=16.1.2)\n Panda Small Business Protection (<=16.1.2)\n Panda Internet Security 2016 (<=16.1.2)",
191380191380
"references": [
191381-
"CVE-2025-34109"
191381+
"CVE-2025-34109",
191382+
"EDB-40020",
191383+
"URL-http://www.security-assessment.com/files/documents/advisory/Panda%20Security%20-%20Privilege%20Escalation.pdf",
191384+
"URL-http://www.pandasecurity.com/uk/support/card?id=100053"
191382191385
],
191383191386
"platform": "Windows",
191384191387
"arch": "",
@@ -191389,7 +191392,7 @@
191389191392
"Windows x86",
191390191393
"Windows x64"
191391191394
],
191392-
"mod_time": "2025-10-06 17:15:11 +0000",
191395+
"mod_time": "2025-12-27 09:09:19 +0000",
191393191396
"path": "/modules/exploits/windows/local/panda_psevents.rb",
191394191397
"is_install_path": true,
191395191398
"ref_name": "windows/local/panda_psevents",

0 commit comments

Comments
 (0)