Jack Heysel
|
37bc4ca51f
|
Fixed root password resetting
|
2023-09-29 11:40:03 -04:00 |
|
Jack Heysel
|
58642c16c9
|
Changed WebSocket to SSH
|
2023-09-28 14:41:03 -04:00 |
|
Jack Heysel
|
3f15de3995
|
Responded to Christophes suggestions
|
2023-09-28 14:26:37 -04:00 |
|
Jack Heysel
|
3eaa4adcb7
|
rubocop
|
2023-09-26 18:48:33 -04:00 |
|
Jack Heysel
|
9a1881cbcf
|
jvoisin suggestions
|
2023-09-26 18:42:14 -04:00 |
|
Jack Heysel
|
09f3a98d13
|
Finished JAIL_BREAK addition
|
2023-09-26 16:45:28 -04:00 |
|
Jack Heysel
|
b4539f174d
|
Added JAIL_BREAK option and corresponding methods
|
2023-09-25 19:03:54 -04:00 |
|
Jack Heysel
|
127f0104d2
|
Address review comments
|
2023-09-21 13:36:00 -04:00 |
|
Jack Heysel
|
12de4dd2c7
|
Improved request sending and added watchtower ref
|
2023-09-21 09:45:59 -04:00 |
|
Jack Heysel
|
da8c020d14
|
Junos OS SRX and EX PHPRC Manipulation RCE
|
2023-09-20 16:47:05 -04:00 |
|
Spencer McIntyre
|
baa0f3d5e3
|
Switch the fingerprint resource for v12 compat
Switching to use citrix-fonts.css allows the technique to work for 12.x
and 13.x.
|
2023-08-08 08:57:17 -04:00 |
|
Spencer McIntyre
|
72092392e9
|
Fix check method for v12, add automatic targeting
|
2023-08-08 08:57:11 -04:00 |
|
Spencer McIntyre
|
760bc3fbfb
|
Add a target for 12.1-64.17
|
2023-08-04 16:21:21 -04:00 |
|
Spencer McIntyre
|
c3324ab002
|
Add a target for 12.1-65.25
|
2023-08-04 15:14:24 -04:00 |
|
Spencer McIntyre
|
67e1c57b7c
|
Fix some buffer encoding issues
|
2023-08-03 12:47:14 -04:00 |
|
Spencer McIntyre
|
930c90c3ac
|
Update all targets so the stack can be relocated
|
2023-08-02 14:49:04 -04:00 |
|
Spencer McIntyre
|
b365ab7d10
|
Add a target for 13.1-37.38
|
2023-08-02 13:57:53 -04:00 |
|
Spencer McIntyre
|
5d0b6e1fbc
|
Add a target for 13.0-91.12
|
2023-08-02 12:48:34 -04:00 |
|
Spencer McIntyre
|
eb5be5746c
|
Add a basic check method to detect Citrix
|
2023-08-01 12:17:30 -04:00 |
|
Spencer McIntyre
|
f787bcd04f
|
Define the space for the payload
|
2023-07-31 18:06:38 -04:00 |
|
Spencer McIntyre
|
de6508c3e3
|
Initial commit of CVE-2023-3519
|
2023-07-31 17:30:52 -04:00 |
|
bcoles
|
a83d070396
|
exploits/freebsd/local/ip6_setpktopt_uaf_priv_esc: Add Reliability notes
|
2023-02-02 18:45:43 +11:00 |
|
bcoles
|
ef87a63bde
|
modules: Check datastore ForceExploit before checking if session is root
|
2023-02-02 18:17:02 +11:00 |
|
adfoster-r7
|
4a9a15e638
|
Run Rubocop layout rules on modules
|
2021-08-27 17:19:43 +01:00 |
|
William Vu
|
9e6f425427
|
Move exploit/linux/http/citrix_dir_traversal_rce
To exploit/freebsd/http/citrix_dir_traversal_rce. It's actually FreeBSD.
|
2021-04-15 19:13:25 -05:00 |
|
capme
|
b99114787a
|
re-adding first check, but not including [^ ]
|
2021-03-17 06:51:08 +07:00 |
|
capme
|
294a1a275c
|
dropping extra version c that stated vulnerable
|
2021-03-17 06:20:59 +07:00 |
|
capme
|
26c653ef4a
|
implement also for freebsd
|
2021-03-17 06:13:51 +07:00 |
|
Alan Foster
|
5b3fde7735
|
Rubocop recently landed modules
|
2021-02-16 15:08:08 +00:00 |
|
Christophe De La Fuente
|
a939704f9d
|
Add an SNMPPORT options
|
2020-12-16 15:15:27 +01:00 |
|
Christophe De La Fuente
|
60bcc95edc
|
Fix documentation
|
2020-12-16 15:15:27 +01:00 |
|
Christophe De La Fuente
|
a6102bd8ac
|
Make rubocop happy
|
2020-12-16 15:15:27 +01:00 |
|
Christophe De La Fuente
|
99d3f66271
|
Add authentication and refactor
|
2020-12-16 15:15:27 +01:00 |
|
Christophe De La Fuente
|
08f051e959
|
Apply rubocop
|
2020-12-16 15:15:27 +01:00 |
|
Christophe De La Fuente
|
56560c901b
|
Add SpamTitan RCE module
|
2020-12-16 15:15:26 +01:00 |
|
Alan Foster
|
30809787c4
|
Convert disclosure dates to iso8601
|
2020-10-02 21:00:37 +01:00 |
|
Brendan Coles
|
786d59d360
|
Use AutoCheck mixin and prefer cc over gcc
|
2020-08-24 11:47:50 +00:00 |
|
Jeffrey Martin
|
9aa26d1208
|
Merge upstream into 6.x
|
2020-08-03 11:43:47 -05:00 |
|
Brendan Coles
|
95b99ce5cf
|
Use Msf::Exploit::Remote::AutoCheck
|
2020-07-26 08:04:37 +00:00 |
|
Brendan Coles
|
476281d4bd
|
Use Msf::Post::Unix.is_root?
|
2020-07-26 08:04:37 +00:00 |
|
Brendan Coles
|
fbc77f7576
|
Add FreeBSD ip6_setpktopt Use-After-Free Privilege Escalation module
|
2020-07-26 08:04:37 +00:00 |
|
Brendan Coles
|
9d2b706d92
|
Use AutoCheck mixin and prefer cc over gcc
|
2020-07-18 23:31:34 +00:00 |
|
Jeffrey Martin
|
65039a5091
|
Merge upstream into 6.x
|
2020-07-15 09:58:07 -05:00 |
|
Brendan Coles
|
090b80eea7
|
Add Msf::Post::Unix.is_root? method
|
2020-07-12 00:47:56 +00:00 |
|
Christophe De La Fuente
|
9f2a29d4fe
|
Update last batch of modules
|
2020-06-09 14:18:52 +02:00 |
|
Brendan Coles
|
b76507f1f3
|
Add FreeBSD rtld execl() Privilege Escalation module
|
2019-05-20 13:03:20 -05:00 |
|
Brendan Coles
|
983b39a5b3
|
Use @iZsh's exploit
|
2018-12-21 15:40:01 +00:00 |
|
Brendan Coles
|
b8dd147d49
|
Add FreeBSD 9 Intel SYSRET Privilege Escalation module
|
2018-12-09 16:04:38 +00:00 |
|
William Vu
|
4c036e70c1
|
Fix http://seclists.org links to https://
I have no idea how this happened in my own code. I was seeing https://.
|
2018-09-15 18:54:45 -05:00 |
|
asoto-r7
|
1a3a4ef5e4
|
Revised 88 aux and exploit modules to add CVEs / references
|
2018-07-12 17:34:52 -05:00 |
|