Clément Notin
69ab2154ad
wordpress_content_injection: fix CVE number
2019-06-05 12:43:16 +02:00
Jacob Robles
9edf92434c
Land #11895 , CVE-2018-20434 LibreNMS cmd injection exploit
2019-06-04 12:28:24 -05:00
Jacob Robles
c93c65cef5
Update date format
2019-06-04 12:24:00 -05:00
Jacob Robles
c1572c89a8
Land #11841 , IBM WAS Network Deployment RCE CVE-2019-4279
2019-06-04 11:49:05 -05:00
Wei Chen
b8abb550e6
Land #11924 , Update adobe_flash_opaque_background_uaf for Win 10
2019-06-04 00:51:34 -05:00
bwatters-r7
6f711dfab4
Land #11918 , replace trivial usage of expand_path with getenv
...
Merge branch 'land-11918' into upstream-master
2019-06-03 16:59:39 -05:00
suzu991154
cdce03f42d
fix_os_check
2019-06-03 16:17:23 +09:00
Chris Higgins
6ffc6b9b18
Fix #11934 , frontpage_credential_dump.md file move
2019-06-02 12:40:18 -05:00
Tim W
b5bdc06c4c
Land #11933 , add default VID and cmd/unix support to post/multi/manage/play_youtube
2019-06-03 00:39:11 +08:00
William Vu
42082f0bcf
Add unix platform
2019-06-02 11:31:43 -05:00
William Vu
fe5bc8242f
Add cmd/unix support
2019-06-02 11:19:44 -05:00
William Vu
852cd6c6c6
Note unused variables
2019-06-02 11:19:30 -05:00
William Vu
290741719c
Add default VID to post/multi/manage/play_youtube
2019-06-02 11:01:57 -05:00
Tim W
d0cce0a6a4
offsets for iPhone 5S 10.2.1
2019-06-02 10:19:24 +08:00
Tim W
5b708532b4
use MetasploitPayloads to_binary
2019-06-02 10:19:24 +08:00
Tim W
c659a1e5b4
add description
2019-06-02 10:19:24 +08:00
Tim W
aabe316662
fixes for iOS 10
2019-06-02 10:19:24 +08:00
Tim W
2b54d411f6
fix iOS 11 offset cache
2019-06-02 10:19:24 +08:00
Tim W
e6a8d66460
fix iOS 10 again
2019-06-02 10:19:24 +08:00
Tim W
b7574f2dd8
cleanup
2019-06-02 10:19:24 +08:00
Tim W
6d9385cb8a
ios 11 faf
2019-06-02 10:19:24 +08:00
Tim W
b142115c82
fix iOS 11.0.2
2019-06-02 10:19:24 +08:00
Tim W
6f6cf443b6
begin iOS 11
2019-06-02 10:19:24 +08:00
Tim W
33a4866c36
add offset cache
2019-06-02 10:19:24 +08:00
Tim W
f15e70ea03
various fixes
2019-06-02 10:19:24 +08:00
Tim W
3d414dac74
add hash to trust cache
2019-06-02 10:19:24 +08:00
Tim W
32af9cb897
Initial commit of CVE-2018-4233 for iOS 10
2019-06-02 10:19:24 +08:00
Brent Cook
4286068154
Land #11906 , fix osx 10.7 hash IDing and JTR IDs
2019-06-01 12:05:35 -05:00
suzu991154
0a6f1d5538
Add support for Windows 10(10240) to CVE-2015-5122
2019-06-01 14:44:30 +09:00
Brent Cook
53557cc92e
replace trivial usage of expand_path with getenv
...
expand_path is not implemented consistently across platforms and
sessions, which leads to confusing behavior. In places where we have trivial
single variable expansions, this changes modules and library code to just use
getenv.
We'll look at the rest individually to see if they can also be reimplemented in
terms of getenv.
2019-05-31 17:44:35 -05:00
Brent Cook
b9af69a5be
update payloads
2019-05-31 09:32:44 -05:00
h00die
06256cc05b
fix osx 10.7 hash IDing, and JTR ids
2019-05-30 18:33:45 -04:00
Shelby Pace
c2786eb87c
made suggested changes
2019-05-30 14:09:40 -05:00
Jacob Robles
1069c3de4f
File cleanup
2019-05-30 13:36:28 -05:00
Shelby Pace
74812ffe4d
Update modules/exploits/linux/http/librenms_addhost_cmd_inject.rb
...
Co-Authored-By: @shellfail <jrobles@rapid7.com >
2019-05-30 10:52:34 -05:00
Shelby Pace
8c11a1c95a
Update modules/exploits/linux/http/librenms_addhost_cmd_inject.rb
...
Co-Authored-By: @shellfail <jrobles@rapid7.com >
2019-05-30 10:51:57 -05:00
William Vu
622e67d20a
Land #11900 , normalize_uri style fix
2019-05-30 00:16:16 -05:00
William Vu
a0c6035380
Prefer initial slash in normalize_uri
...
I missed the indirect call in check. This decides on a style.
If a URI part contains a slash, we begin with a slash.
2019-05-30 00:08:17 -05:00
Brent Cook
810d5e356f
Land #11865 , expand utility for allegro_rompager_auth_bypass
2019-05-29 23:40:37 -05:00
Jeffrey Martin
1833c97c8c
more require for pdf-reader
...
In ruby 2,5+ on windows the ttfunk dependency loading causes ruby to crash so
only load this only when specifically required.
2019-05-29 22:36:50 -05:00
Shelby Pace
590b9748c1
changed file name and documentation
2019-05-29 18:30:39 -05:00
Shelby Pace
6606e1fed4
Update modules/exploits/linux/http/librenms_cmd_injection.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-05-29 18:00:59 -05:00
Shelby Pace
5253d34dd3
Update modules/exploits/linux/http/librenms_cmd_injection.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-05-29 18:00:07 -05:00
Shelby Pace
34528b1512
Update modules/exploits/linux/http/librenms_cmd_injection.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-05-29 17:59:55 -05:00
Shelby Pace
fa1ce20e74
add note
2019-05-29 15:50:31 -05:00
Shelby Pace
de081a08cd
add working exploit
2019-05-29 15:09:23 -05:00
Jacob Robles
87e9fddd2f
CMD Target Update
...
Generic payload auto-disables the handler so we don't have
to handle that now. Also, remove datastore modifications
in the module.
2019-05-29 13:09:21 -05:00
William Vu
6580f14c3a
Once more, with feeling
2019-05-29 12:19:52 -05:00
William Vu
78fca9f91a
Suggest CASTV2 is unsupported
2019-05-29 11:50:53 -05:00
William Vu
9ba1ac075a
Add word
2019-05-29 11:46:45 -05:00