Commit Graph

379 Commits

Author SHA1 Message Date
Wei Chen 5e65685167 Update documentation for zip slip 2019-09-09 12:00:05 -05:00
Shelby Pace c4bd91f505 Land #12272, add October CMS file upload 2019-09-06 10:13:33 -05:00
Shelby Pace b0625012c4 add vulnerable software version 2019-09-06 10:12:08 -05:00
Shelby Pace 5f7c243b48 add filedropper, fix check, add to docs 2019-09-06 09:49:09 -05:00
Touhid M Shaikh b9e702458d Update documentation/modules/exploit/multi/http/october_upload_bypass_exec.md
Co-Authored-By: bcoles <bcoles@gmail.com>
2019-09-04 23:01:44 +05:30
Touhid M Shaikh 9179ce1de1 Update documentation/modules/exploit/multi/http/october_upload_bypass_exec.md
Co-Authored-By: bcoles <bcoles@gmail.com>
2019-09-04 12:32:23 +05:30
Touhid M Shaikh 90b639da71 Update documentation/modules/exploit/multi/http/october_upload_bypass_exec.md
Co-Authored-By: bcoles <bcoles@gmail.com>
2019-09-04 12:32:15 +05:30
Touhid M Shaikh c9b0054629 october_upload_bypass_exec Doc
october_upload_bypass_exec Documetation
2019-09-03 12:26:41 +05:30
William Vu 042c181f67 Land #12058, cisco_dcnm_upload_2019 exploit 2019-08-30 13:33:19 -05:00
Pedro Ribeiro 23d7a0ed2b Create cisco_dcnm_upload_2019.md 2019-08-29 22:45:03 +07:00
Load 6b4acbc3ac Updates scenarios 2019-08-18 15:14:37 +02:00
Load 7e44194251 References next CVE with global events 2019-08-16 12:54:01 +02:00
LoadLow 2432104a8d Update libreoffice_logo_exec.md 2019-08-03 06:24:04 +02:00
LoadLow 41822c0c1e Update libreoffice_logo_exec.md 2019-08-03 06:15:19 +02:00
LoadLow c3b6e33f2e Adds suggested modifications 2019-08-03 06:10:11 +02:00
Load ee6c4a906a Update libreoffice_logo_exec documentation
Co-Authored-By: bcoles <bcoles@gmail.com>
2019-08-03 05:53:40 +02:00
Load dbced012ef Update libreoffice_logo_exec documentation
Co-Authored-By: bcoles <bcoles@gmail.com>
2019-08-03 05:53:29 +02:00
Load 5e2463c5d4 Update libreoffice_logo_exec documentation
Co-Authored-By: Carter Brainerd <0xCB@protonmail.com>
2019-08-03 05:51:50 +02:00
Load 009e2afcfa Update libreoffice_logo_exec documentation
Co-Authored-By: bcoles <bcoles@gmail.com>
2019-08-03 05:51:30 +02:00
LoadLow 97589e534e Updates documentation for libreoffice_logo_exec 2019-07-30 23:37:06 +02:00
LoadLow b2dcaf6c4a Adds documentation for libreoffice_logo_exec 2019-07-30 23:34:54 +02:00
Wei Chen 967b2a018f Land #12010, Add exploit module for wp-database-backup Wordpress plugin 2019-07-23 12:21:23 -05:00
William Vu cf140f0840 Make SRVHOST the callback address 2019-06-25 12:43:04 -05:00
Shelby Pace 2af76c1997 add documentation and finished module 2019-06-25 11:21:15 -05:00
William Vu 801af31d6f Update documentation 2019-05-22 15:03:44 -05:00
Wei Chen ff0ad88598 Update weblogic_deserialize_asyncresponseservice.md for options 2019-05-22 14:19:30 -05:00
Wei Chen 9b9178a59a Update weblogic_deserialize_asyncresponseservice.md for outputs 2019-05-22 14:16:32 -05:00
Wei Chen 7986706f83 Update markdown description for the right CVE 2019-05-20 13:14:56 -05:00
Wei Chen 6847fcc199 Update CVE reference and datastore options for WebLogic exploit 2019-05-20 13:10:06 -05:00
Wei Chen ad08c4e56b Land #11828, Add CVE-2017-18357: Shopware Object Instantiation 2019-05-17 18:22:48 -05:00
Shelby Pace 730f912fea Land #11802, add GetSimple CMS RCE module 2019-05-16 11:30:21 -05:00
Shelby Pace 54adb4eaab add documentation 2019-05-16 11:28:43 -05:00
stevenseeley 30401978c1 updated demo in docs 2019-05-09 21:32:01 -05:00
stevenseeley 965a19fb95 updated docs to include custom pop chain as suggested by @bcoles 2019-05-09 21:28:11 -05:00
stevenseeley 6ffef18028 updated documentation a little 2019-05-09 15:51:34 -05:00
stevenseeley aaa0dd2532 added module for CVE-2017-18357 2019-05-09 15:17:43 -05:00
stevenseeley 89e3a07518 added module for CVE-2017-18357 2019-05-09 15:08:33 -05:00
William Vu 413929b7f6 Land #11598, Postgres COPY FROM PROGRAM exploit 2019-05-07 01:12:44 -05:00
asoto-r7 f89b0e848f Land PR#11780, exploit/multi/misc/weblogic_deserialize_asyncresponseservice 2019-05-06 15:36:47 -05:00
asoto-r7 aed878100a weblogic_deserialize_asyncresponseservice: Added documentation 2019-05-06 15:18:08 -05:00
Shelby Pace a88858fc8b Land #11779, add Rails Doubletap Dev mode RCE 2019-05-01 08:35:28 -05:00
Shelby Pace 887c09f806 fixed typo 2019-05-01 08:33:44 -05:00
Wei Chen 29344d15b6 Update rails_double_tap doc and module based on bcole feedback 2019-04-30 10:11:32 -05:00
Shelby Pace 10e141c73d Land #11697, add Pimcore unserialize RCE 2019-04-29 08:52:49 -05:00
Wei Chen 738ee70667 Add module documentation for rails_double_rap 2019-04-25 16:31:27 -05:00
Brendan Coles 163c66b5ba Update tested versions 2019-04-21 11:21:28 +00:00
asoto-r7 1ecb309633 Land #11717, exploit/multi/http/confluence_widget_connector 2019-04-18 12:14:09 -05:00
William Vu c03ee656a3 Merge remote-tracking branch 'upstream/master' into HEAD 2019-04-16 16:02:11 -05:00
asoto-r7 06792f7cd4 Moved documentation to 'documentation' folder 2019-04-16 14:16:52 -05:00
Shelby Pace d0c29e7b1e mention needed handler in usage instructions 2019-04-15 08:47:13 -05:00