h4x-x0r
37c148cc7c
CVE-2024-47407
...
CVE-2024-47407
2024-11-13 03:55:17 +00:00
h00die
ce9f1b9101
fix nsfw link
2025-01-09 21:23:38 -05:00
Diego Ledda
58702f238c
Land #19574 , Windows Access Mode Mismatch LPE in ks.sys (CVE-2024-35230)
...
Land #19574 , Windows Access Mode Mismatch LPE in ks.sys (CVE-2024-35230)
2024-12-04 16:39:43 +01:00
Spencer McIntyre
e52edf447c
Implement feedback from the PR
2024-11-20 13:51:39 -05:00
Jack Heysel
81b83f2fd6
Updated docs and check
2024-11-06 09:13:51 -08:00
Jack Heysel
7a5bc60aab
Windows Access Mode Mismatch LPE in ks.sys [CVE-2024-35250]
2024-11-05 15:31:44 -08:00
Spencer McIntyre
9f41937c7a
Finish up the exploit module
2024-10-28 17:20:35 -04:00
dledda-r7
0bf524482c
Land #19345 , Post module Windows LPE CVE-2024-30088
2024-09-17 08:13:21 -04:00
Jack Heysel
7bfd814297
Removed memory polling
2024-08-30 12:52:18 -07:00
adfoster-r7
fabb5d1f78
Land #19422 , pgAdmin 8.4 RCE / CVE-2024-3116
2024-08-28 18:54:53 +01:00
adfoster-r7
aaf95f9134
Apply suggestions from code review
2024-08-28 18:46:08 +01:00
igomeow
7e9f52dd0b
Github release
2024-08-26 23:02:53 +02:00
igomeow
b3605bd951
Documentation
2024-08-26 19:59:17 +02:00
jheysel-r7
bde9fca9e4
Apply suggestions from code review
2024-08-22 02:35:21 -04:00
Jack Heysel
31348dac33
Windows LPE CVE-2024-30088
2024-08-21 23:16:37 -07:00
dledda-r7
35da4662ed
Land #19351 , DIAEnergie SQL Injection
2024-08-21 09:44:15 -04:00
h4x-x0r
8732d7cd58
LG Simple Editor Command Injection (CVE-2023-40504) Module
...
Exploit Module and Documentation for the LG Simple Editor Command Injection (CVE-2023-40504)
2024-08-07 05:16:25 +01:00
h4x-x0r
80961b0fef
Merge branch 'rapid7:master' into my_awesome_branch
2024-08-01 22:57:36 -05:00
dledda-r7
48c69b99fb
Land #19344 , FortiClient EMS FCTID SQLi to RCE fix for 7.2.x
2024-07-31 09:43:19 -04:00
h4x-x0r
2d9aed7ec3
fixed typo
2024-07-30 13:39:03 -04:00
h4x-x0r
cd1c100bd8
DIAEnergie SQL Injection (CVE-2024-4548) Module Documentation
2024-07-30 13:21:34 -04:00
h4x-x0r
14945679ba
Updated email generation part.
2024-07-25 23:54:27 -04:00
h4x-x0r
c8feb5c5e6
Updated formatting
2024-07-24 22:40:00 -04:00
Jack Heysel
c05aebe248
Formatting
2024-07-24 11:16:26 -07:00
Jack Heysel
e9cbb9287c
Add support for 7.2.x
2024-07-24 10:45:38 -07:00
h4x-x0r
9bfaf6343a
Updated the module to take advantage of the check method
2024-07-23 23:48:32 -04:00
h4x-x0r
2bdba1a48d
Documentation for the MyPRO Command Injection (CVE-2023-28384) Module.
2024-07-22 16:46:37 -04:00
bwatters
636c72965c
Land #19084 , Add CVE-2022-1373 and CVE-2022-2334 exploit chain
...
Merge branch 'land-19084' into upstream-master
2024-07-19 12:22:25 -05:00
Christophe De La Fuente
ecb628eaab
Add module and documentation
2024-06-20 15:30:54 +02:00
Jack Heysel
dc70aa0896
Land #19247 , PHP CGI Arg injection RCE
...
XAMPP installs running on Windows system configured to use Japanese or
Chinese (simplified or traditional) locales are vulnerable to a PHP CGI
argument injection vulnerability. This exploit module returns a session
running in the context of the Administrator user
2024-06-17 11:27:38 -07:00
Stephen Fewer
d7531ef74c
fix typo in documentation
...
Co-authored-by: jheysel-r7 <Jack_Heysel@rapid7.com >
2024-06-13 15:09:56 +01:00
Spencer McIntyre
18fe758416
Finish up and document the deserialization RCE
2024-06-12 08:58:37 -04:00
Stephen Fewer
2d63038196
Update documentation/modules/exploit/windows/http/rejetto_hfs_rce_cve_2024_23692.md
...
fix a typo in the documentation.
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-06-11 16:23:56 +01:00
sfewer-r7
bf9b3f1d2a
add documentation
2024-06-10 17:41:55 +01:00
sfewer-r7
c8208704be
add in exploit module for CVE-2024-23692
2024-06-06 18:04:14 +01:00
h00die
a89d418725
review of northstar c2
2024-05-16 15:17:28 -04:00
h00die
19af4ae4e6
mermaid flow chart
2024-04-24 16:54:02 -04:00
h00die
9fb217fb59
northstar c2 exploit
2024-04-24 16:54:02 -04:00
Zach Goldman
488653d942
Land #19082 , FortiNet FortiClient EMS SQLi to RCE [CVE-2023-48788]
2024-04-19 15:03:22 -04:00
fanqiaojun
6b2bdc893b
chore: remove repetitive words
...
Signed-off-by: fanqiaojun <fanqiaojun@yeah.net >
2024-04-15 11:06:50 +08:00
Imran E. Dawoodjee
50a303a6e5
Update references and documentation
2024-04-13 18:21:05 +08:00
Imran E. Dawoodjee
6268235cd3
Add CVE-2022-1373 and CVE-2022-2334 exploit chain
2024-04-13 18:10:45 +08:00
Jack Heysel
dae9657433
FortiClient EMS Exploit Module
2024-04-12 10:00:07 -07:00
bwatters
e58c6b9df2
Land #18721 , SharePoint Unauth RCE Exploit Chain (CVE-2023-29357 & CVE-2023-24955)
...
Merge branch 'land-18721' into upstream-master
2024-03-26 12:42:22 -05:00
adfoster-r7
decba4350e
Additional changes to documentation
2024-03-25 10:53:08 +00:00
Zach Goldman
2c307f1bb3
Adds session documentation
...
add more console output, add to pentesting side
split out session, help, query, query_interactive sections
add multiline examples
update mysql, smb
2024-03-21 09:52:10 -05:00
Jack Heysel
4e4303c274
Fixed backup_bdc_metadata initialization
2024-02-15 09:26:54 -05:00
Jack Heysel
326b50bd4d
Responded to comments
2024-02-06 15:22:21 -05:00
bwatters
46a0052286
Land #18568 , added exploit for CVE-2023-32781 - PRTG authenticated RCE
...
Merge branch 'land-18568' into upstream-master
2024-01-22 11:35:38 -06:00
jheysel-r7
5f1fa2a678
Apply suggestions from jvoisin
...
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com >
2024-01-19 20:30:53 -05:00