Quentin Kaiser
3517a4e237
Adapt ranking and mention potential stability issue.
2019-04-09 11:31:15 +02:00
Quentin Kaiser
9baaedce4e
Indicate potential DoS in description. Define exploit stance explicitly.
2019-03-24 22:29:07 +01:00
Quentin Kaiser
5c048e7cd6
CISCO-SA not supported.
2019-03-24 22:20:31 +01:00
Quentin Kaiser
be73f56610
Only got researchers name, no email.
2019-03-24 17:50:31 +01:00
Quentin Kaiser
4451225da7
Add httpd service reloading.
2019-03-24 17:49:55 +01:00
Quentin Kaiser
5562af39d3
Use CmdStager instead of hardcoded wget command.
2019-03-22 20:10:29 +01:00
Quentin Kaiser
ef2c4310a4
Exploit for CVE-2019-1663 on Cisco RV130(W).
2019-03-22 17:34:12 +01:00
William Vu
715409496e
Fix #11210 , imperva_securesphere_exec options
2019-03-05 22:01:24 -06:00
William Vu
4e31f53ca2
Fix required USERNAME and PASSWORD
...
Somehow I forgot to commit this? Strange.
2019-03-05 21:57:42 -06:00
William Vu
c48dec7331
Land #11210 , imperva_securesphere_exec exploit
2019-03-05 21:52:13 -06:00
William Vu
4e76eeceb7
Clean up module
2019-03-05 21:37:55 -06:00
rsp3ar
b5587b926c
Add ForceExploit and fix code ident
2019-02-26 19:59:31 -08:00
Wei Chen
18a4af1d1d
Land #11279 , improve imap_open exploit to be more robust
2019-02-08 18:28:08 -06:00
Tod Beardsley
daa3076d42
Add CVE-2018-1000999 to MailCleaner module
...
See PR #11148
This adds the new CVE assigned by DWF for this vulnerability.
Note that [CVE-2018-10933](https://www.cvedetails.com/cve/CVE-2018-10933/ )
describes a vulnerability in libssh, but this one describes the issue as
it pertains to MailCleaner specifically.
2019-01-23 09:27:12 -06:00
h00die
f47060870a
horde imp h3 imap_open
2019-01-18 19:43:45 -05:00
h00die
2585e4b708
horde imp h3 imap_open
2019-01-18 19:38:30 -05:00
h00die
5d49f04948
not working horde imp imap_open
2019-01-17 19:55:42 -05:00
rsp3ar
2577160449
update print_error, add PrependFork and adjust timeout
2019-01-16 23:20:06 -08:00
Wei Chen
47f8738f74
Add Imran Rashid to CVE-2018-11770 credit
2019-01-14 15:28:08 -06:00
Wei Chen
52ff0a8b75
Update exploits/linux/http/spark_unauth_rce as CVE-2018-11770
2019-01-14 15:10:29 -06:00
Brendan Coles
24f807490f
revisionism
2019-01-10 19:19:14 +00:00
rsp3ar
71aa4c8d9e
Adding respond code/body check for successful command execution
2019-01-10 00:01:19 -08:00
rsp3ar
3aabeee959
Update SSL, timeout and uid regex
2019-01-09 23:20:37 -08:00
Brendan Coles
5a956bb27b
Apply suggestions from code review
...
Co-Authored-By: rsp3ar <rsp3ar@users.noreply.github.com >
2019-01-09 21:07:01 -08:00
h00die
799a79b715
ueb priv esc suggestion
2019-01-09 20:28:53 -05:00
rsp3ar
24de5d6ee3
Update to use CmdStager
2019-01-08 20:07:35 -08:00
Jacob Robles
a0acfa79d7
Target payloads
2019-01-08 13:27:26 -06:00
rsp3ar
bab651e94d
Add Imperva SecureSphere module
2019-01-07 22:18:04 -08:00
Mehmet İnce
4e8ad22a7a
Adding CVE number
2018-12-26 13:15:36 +03:00
Mehmet İnce
fa542b9691
Adding platform and arch to top level
2018-12-25 15:56:25 +03:00
Mehmet İnce
9481ad04f2
Adding support for ARCH_CMD and updating docs
2018-12-20 12:12:01 +03:00
Mehmet İnce
68ceb08957
Fixing minor issues such as err codes
2018-12-19 22:17:34 +03:00
Mehmet İnce
e5c8c18ded
Adding Mailcleaner exec
2018-12-19 17:35:40 +03:00
William Vu
cb5648a1c7
Add WEBUI_PORT to hp_van_sdn_cmd_inject exploit
2018-12-13 12:22:36 -06:00
William Vu
e69f006992
Remove CommandShell mixin in exploits
...
This was cargo culting. Exploits use handler instead of start_session.
2018-12-12 15:43:13 -06:00
Tod Beardsley
140833215f
Add CVE as issued by DWF
...
See discussion on #10987 .
Now that I said that out loud, I realize that the original PR for this
module is a really funny PR number.
2018-12-06 14:59:05 -06:00
Jacob Robles
dec08a0b43
Land #10954 , apache spark unauth rce module
2018-11-29 13:56:21 -06:00
Jacob Robles
01af176679
Change delay implementation
2018-11-29 10:05:47 -06:00
Jacob Robles
ed6c2896e3
Remove duplicate check
2018-11-29 10:04:51 -06:00
Jacob Robles
8508824cc2
Modify check logic
2018-11-29 10:04:05 -06:00
Green-m
4888ec0c29
Delete unused variable.
2018-11-29 10:48:25 +08:00
Green-m
ca0a2684f5
Randomize payload main class.
2018-11-28 11:26:51 +08:00
h00die
63125bbc1a
update imap_open refs
2018-11-27 20:31:57 -05:00
Brent Cook
b05bb616bf
Land #10987 , add exploit for PHP imap_open function against various web apps
2018-11-27 16:44:51 -06:00
Brent Cook
0fddb8e31c
Land #10768 , Exploit for Netgear CVE-2016-1555
2018-11-26 11:45:10 -06:00
h00die
e2d58afe13
cleaned up code, added custom
2018-11-25 10:59:53 -05:00
Brendan Coles
debf79416b
Replace WsfDelay with WfsDelay - Fixes #11018
2018-11-25 04:22:11 +00:00
h00die
945755b058
add custom php_imap target
2018-11-24 14:18:13 -05:00
h00die
45f2c5beb2
update php_imap_open docs
2018-11-24 07:26:42 -05:00
h00die
e36cef3b96
e107 exploitable now
2018-11-23 20:16:53 -05:00