bwatters
|
46a0052286
|
Land #18568, added exploit for CVE-2023-32781 - PRTG authenticated RCE
Merge branch 'land-18568' into upstream-master
|
2024-01-22 11:35:38 -06:00 |
|
Spencer McIntyre
|
06dcc82ced
|
Land #18630, Add CVE-2023-50917: MajorDoMo RCE
Add CVE-2023-50917: MajorDoMo Command Injection Module
|
2024-01-19 17:10:40 -05:00 |
|
bwatters
|
fadb0f45dd
|
Land #18708, Ivanti Connect Secure RCE exploit module (CVE-2023-46805 and CVE-2024-21887)
Merge branch 'land-18708' into upstream-master
|
2024-01-19 15:47:43 -06:00 |
|
ekalinichev-r7
|
847a72c417
|
Land #18638, add exploit for CVE-2022-42889 Apache Commons Text RCE
|
2024-01-19 13:02:53 +01:00 |
|
Stephen Fewer
|
5ba4aba912
|
Update documentation/modules/exploit/linux/http/ivanti_connect_secure_rce_cve_2023_46805.md
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
|
2024-01-18 09:18:28 +00:00 |
|
Christophe De La Fuente
|
b8aa55c322
|
Land #18633, WordPress Backup Migration Plugin PHP Filter Chain RCE (CVE-2023-6553)
|
2024-01-17 18:42:52 +01:00 |
|
Christophe De La Fuente
|
a8d46b3e7a
|
Land #18627, Ansible: post gather module, payload deployer, and file reader
|
2024-01-17 15:26:25 +01:00 |
|
sfewer-r7
|
2919b36f2b
|
add in docs
|
2024-01-17 10:25:04 +00:00 |
|
Gaurav Jain
|
225ef6847f
|
Add output from test run on windows target
|
2024-01-15 00:26:47 +05:30 |
|
Jack Heysel
|
6d8666e35b
|
Fixed spacing and removed unused method
|
2024-01-11 13:13:57 -05:00 |
|
Jack Heysel
|
cdc66dd91f
|
Last minute fix
|
2024-01-11 12:56:01 -05:00 |
|
Jack Heysel
|
5c7061cc0c
|
Remove OS dependant payload
|
2024-01-11 12:30:04 -05:00 |
|
h00die
|
e711c9ea43
|
ansible review
|
2024-01-10 17:16:57 -05:00 |
|
Gaurav Jain
|
98667edf76
|
Add suggested changes
|
2024-01-05 22:31:51 +05:30 |
|
Spencer McIntyre
|
2028fbd226
|
Land #18404, Working Module for CVE-2023-38146
|
2024-01-04 12:20:26 -05:00 |
|
Gaurav Jain
|
d0beea91bd
|
Add exploit for CVE-2022-42889
|
2023-12-25 00:43:50 +05:30 |
|
h00die
|
11c12fcb6d
|
review comments
|
2023-12-23 13:23:34 -05:00 |
|
Christophe De La Fuente
|
3182cb4000
|
Land #18612, Craft CMS unauthenticed RCE [CVE-2023-41892]
|
2023-12-22 10:59:39 +01:00 |
|
Balgogan
|
0a2dea523f
|
Add suggested changes
|
2023-12-22 00:04:54 +01:00 |
|
bwatters
|
ce43db0904
|
Fix TBDs and give better documentation.
|
2023-12-21 16:18:36 -06:00 |
|
bwatters
|
78bac2636b
|
Add documentation
|
2023-12-20 18:44:05 -06:00 |
|
Jack Heysel
|
eeb74cd5e1
|
Updated metadata
|
2023-12-20 16:49:45 -05:00 |
|
Jack Heysel
|
e3062d45e0
|
Module working docs updated
|
2023-12-20 16:41:52 -05:00 |
|
Christophe De La Fuente
|
fb26c93291
|
Land #18541, Glibc Tunables Privilege Escalation CVE-2023-4911 (Looney Tunables)
|
2023-12-20 20:04:21 +01:00 |
|
Christophe De La Fuente
|
7ca256560d
|
Land #18542, Vinchin Backup & Recovery Command Injection
|
2023-12-20 18:56:50 +01:00 |
|
Balgogan
|
22a05c8bf5
|
Add CVE-2023-50917
|
2023-12-20 00:43:00 +01:00 |
|
Jack Heysel
|
065abf6b92
|
Rubocop, doc scenario update
|
2023-12-19 12:30:02 -05:00 |
|
Jack Heysel
|
4e61596e7a
|
Check Build ID before running exploit
|
2023-12-19 12:15:35 -05:00 |
|
Jack Heysel
|
549ee43df9
|
Update docs description minor comments
|
2023-12-19 00:32:21 -05:00 |
|
Jack Heysel
|
c895364675
|
Initial commit, files created
|
2023-12-18 19:26:14 -05:00 |
|
Christophe De La Fuente
|
45d2c7f4e0
|
Land #18566, CVE-2023-22518: Confluence Auth Bypass Restore From Backup RCE
|
2023-12-18 18:51:36 +01:00 |
|
h00die-gr3y
|
5d7cf90521
|
Some minor changes to the module and documentation
|
2023-12-18 08:23:16 +00:00 |
|
h00die-gr3y
|
9ac3739605
|
Minor changes to the documentation
|
2023-12-17 13:51:30 +00:00 |
|
h00die-gr3y
|
0641839e69
|
Added documentation and removed debug info
|
2023-12-17 13:10:18 +00:00 |
|
h00die
|
c911ec1413
|
ansible collection
|
2023-12-16 07:16:26 -05:00 |
|
Kevin Joensen
|
2f3e207277
|
Fixed documentation for exploit
|
2023-12-15 13:58:10 +01:00 |
|
Jack Heysel
|
d9aa7f914e
|
Added newline to PoC and removed empty file
|
2023-12-14 18:42:09 -05:00 |
|
Jack Heysel
|
df111afb06
|
Glibc Tunables Exploit
|
2023-12-14 18:28:43 -05:00 |
|
Jack Heysel
|
862194d63f
|
Documentation and rubocop changes
|
2023-12-11 19:01:35 -05:00 |
|
bwatters
|
daa6d5363f
|
Land #18577, Added RCE Module for Splunk Enterprise (CVE-2023-46214)
Merge branch 'land-18577' into upstream-master
|
2023-12-11 15:52:05 -06:00 |
|
cgranleese-r7
|
f794268020
|
Land #18578, Docker cgroup escape (CVE-2022-0492)
|
2023-12-06 16:07:08 +00:00 |
|
h00die
|
eca611aaac
|
review
|
2023-12-05 16:18:39 -05:00 |
|
Christophe De La Fuente
|
10d4b9233b
|
Land #18463, D-Link Router UPnP unauthenticed LAN RCE via a crafted M-SEARCH packet
|
2023-12-05 10:58:15 +01:00 |
|
Balgogan
|
ab9576f83d
|
Add changes
|
2023-12-01 10:55:04 +01:00 |
|
h00die
|
22242732d9
|
working cve-2022-0492
|
2023-11-28 15:25:53 -05:00 |
|
h00die
|
b171b5e77c
|
working cve-2022-0492
|
2023-11-28 15:16:18 -05:00 |
|
h00die
|
4ae62a431b
|
not-working docker escape
|
2023-11-28 13:44:08 -05:00 |
|
Balgogan
|
b2fa201a7d
|
Implement check
|
2023-11-28 16:45:44 +01:00 |
|
Balgogan
|
0146527e55
|
Add splunk_xslt_authenticated_rce
|
2023-11-28 15:40:05 +01:00 |
|
Balgogan
|
402434bbf2
|
Add module output
|
2023-11-28 08:41:35 +01:00 |
|