EgiX
d62b8d16c6
Update opensis_chain_exec.md
2020-07-03 17:43:10 +02:00
EgiX
ab703f376b
Create opensis_chain_exec.md
2020-07-01 23:51:17 +02:00
William Vu
b81629d099
Clean up module
2020-06-28 23:07:10 -05:00
William Vu
72dbbedcfc
Clean up module doc
2020-06-26 11:25:41 -05:00
William Vu
7273ac1a92
Move module to unix/webapp
2020-06-25 12:44:42 -05:00
Adam Galway
2c4d158086
Land #13170 , Blind RCE exploit for Zivif Cameras
2020-06-16 13:05:35 +01:00
Silas Cutler
5f29af114b
Added documentation and set default payload
2020-06-15 15:51:28 -04:00
ChristopherAnders
1381eddf50
adding arista_tacacs_shell documentation
2020-06-09 15:49:58 -07:00
Alan Foster
f1c492fa2d
Land #13470 , Pi-Hole < 4.3.3 dhcp static address RCE
2020-05-28 16:57:22 +01:00
h00die
695f212d26
pihole default payload fix
2020-05-28 09:55:04 -04:00
bwatters-r7
cb06a4e731
Land #13455 , Pi-Hole < 3.3 whitelist RCE
...
Merge branch 'land-13455' into upstream-master
2020-05-22 15:35:16 -05:00
h00die
132a74295a
fix doc numbering
2020-05-16 01:39:20 -04:00
h00die
a8673e0efc
pihole dhcp exec
2020-05-16 01:30:58 -04:00
h00die
d496554da0
proper pathing
2020-05-15 19:03:30 -04:00
h00die
809c56af6b
string over regex'
2020-05-14 15:07:10 -04:00
h00die
ebd6eb0302
add authentication processing
2020-05-14 08:53:32 -04:00
h00die
08bd36ae6a
fix docs
2020-05-13 23:37:14 -04:00
h00die
4f5b595d3e
pihole whitelist exec
2020-05-13 23:30:01 -04:00
h00die
3d054973f5
updates to work with 4.4
2020-05-13 20:46:38 -04:00
h00die
9aa8578a75
cve-2020-11108
2020-05-12 22:52:44 -04:00
gwillcox-r7
d2b196f172
Land #13353 , Trixbox CE endpoint_devicemap.php Authenticated RCE
2020-05-04 16:11:05 -05:00
Anastasios Stasinopoulos
18ebf5efa6
Trixbox CE <= v2.8.0.4 Authenticated RCE
...
This module exploits a post-authentication OS command injection vulnerability found in Trixbox CE <= v2.8.0.4 which may allow arbitrary command execution on the underlying operating system.
2020-05-04 15:58:38 -05:00
William Vu
4d635cdcfc
Update module doc
2020-05-01 04:28:17 -05:00
William Vu
c5df5355ac
Update my module documentation to the new standard
...
Also update CheckModule to match current style and best practices.
2020-04-20 20:06:52 -05:00
gwillcox-r7
d759fbaed3
Land #13259 , Miscellaneous fixes for @wvu's modules and documentation
2020-04-16 22:10:10 -05:00
bwatters-r7
15f4f7ea95
Land #13049 , Add fileformat exploit for libnotify plugin
...
Merge branch 'land-13049' into upstream-master
2020-04-16 16:03:14 -05:00
bwatters-r7
a18a5fab68
Rubocop autocorrect and update docs to use ascending numbers
2020-04-16 16:00:56 -05:00
Spencer McIntyre
fe8a191eed
Fix the fixed version for CVE-2020-7350
2020-04-16 15:45:48 -04:00
Spencer McIntyre
286a83afee
Add module documentation and fix the payload CachedSize value
2020-04-16 15:00:18 -04:00
William Vu
994097b410
Update all my module docs to use "options"
2020-04-15 15:47:51 -05:00
William Vu
02ba071b84
Punctuate check prints to match CheckCodes
2020-04-15 15:47:50 -05:00
William Vu
0c3080c318
Add ThinkPHP Multiple PHP Injection RCEs
2020-04-13 02:21:01 -05:00
h00die
e7da6e77a5
remove and check for instruction text
2020-03-24 09:15:04 -04:00
William Vu
865d15975b
Add automatic grammar selection by version number
2020-03-03 18:44:48 -06:00
William Vu
975eb742cb
Add old grammar target and refactor check
2020-03-03 17:41:04 -06:00
William Vu
260aa0533a
Add check method and reorder mixins for super
...
Also fix copypasta'd vulnerable commit.
2020-03-03 17:41:04 -06:00
William Vu
9be6b0a81e
Add module doc
2020-03-03 17:41:04 -06:00
William Vu
e92b9ef97c
Use AutoCheck mixin in OpenSMTPD CVE-2020-7247
...
Also updates the check to be more precise. I had originally copied the
check method from the Morris worm Sendmail exploit:
220 simh Sendmail 5.51/5.17 ready at Wed, 18 Dec 85 11:14:07 PST
Note that there was no "ESMTP" string in 1985's Sendmail.
2020-02-28 10:42:02 -06:00
William Vu
8820944696
Fix exploit/unix/smtp/opensmtpd_mail_from_rce
2020-02-27 02:11:08 -06:00
Christophe De La Fuente
f9077bcd8d
Land #12704 , OpenNetAdmin 18.1.1 Remote Code Execution exploit
2020-02-21 15:49:26 +01:00
Onur ER
e4456c9006
Update opennetadmin_ping_cmd_injection.md
2020-02-21 04:14:21 +03:00
Onur ER
1fe1506b42
Update documentation/modules/exploit/unix/webapp/opennetadmin_ping_cmd_injection.md
...
Co-Authored-By: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com >
2020-02-21 03:06:56 +03:00
Adam Galway
65521270ea
Land #12853 , InfiniteWP exploit & mixin upgrades
2020-02-10 11:33:49 +00:00
William Vu
eab1245eef
Update module doc
2020-02-07 12:30:00 -06:00
William Vu
763dbf5d5d
Check WordPress version
2020-02-07 03:14:17 -06:00
William Vu
6c59d7c37c
Refactor module
2020-02-07 01:38:11 -06:00
William Vu
8c07e17912
Update module docs
2020-02-06 15:57:54 -06:00
William Vu
68565f575f
Update module doc
2020-02-06 14:55:41 -06:00
William Vu
62c98710ad
Reword vulnerable commit range
2020-02-06 11:03:20 -06:00
William Vu
95fa8602bc
Refactor modules that use Expect
2020-02-05 21:16:21 -06:00