kalba-security
a4ded39d62
Remove unnecessary empty lines in docs. Mostly to restart the Travis CI build check because it got stuck.
2020-02-28 10:34:14 +02:00
kalba-security
99ed3afab3
Change filenames for consistency with existing modules
2020-02-27 17:08:23 +02:00
kalba-security
280d1767b4
Add Nagios XI < 5.6.6. exploit module and documentation
2020-02-27 16:58:15 +02:00
Christophe De La Fuente
f484e6c83c
Land #12862 , Apache James 2.3.2 arbitrary file write exploit module
2020-02-20 10:41:13 +01:00
mattaberegg
739928b56a
Added line break to docs
2020-02-19 17:56:13 -08:00
kalba-security
9980a96917
Move documentation to correct directory
2020-02-19 16:57:38 +02:00
Brendan Coles
ac6d0e4391
Add Diamorphine Rootkit Signal Privilege Escalation module
2020-02-16 14:53:16 +00:00
RAMELLA Sébastien
27effc1b56
typo. cmdstager command
2020-02-14 12:25:56 +04:00
mattaberegg
90503b2c61
Documentation cosmetic updates
2020-02-07 18:28:24 -08:00
mattaberegg
a05611d756
Improve cleanup functionality
2020-02-07 16:13:25 -08:00
Alan Foster
4dcb2fbd96
Land #12889 , Add OpenSMTPD MAIL FROM RCE
2020-02-07 11:43:18 +00:00
William Vu
95fa8602bc
Refactor modules that use Expect
2020-02-05 21:16:21 -06:00
Shelby Pace
691a18c997
move docs file, add options
2020-02-05 12:58:46 -06:00
mattaberegg
6f453a0f83
Module rewrite to include Cron exploitation
2020-02-02 17:29:39 -08:00
Tim W
cfffb65a21
Land #12859 , update AF_PACKET chocobo_root linux LPE
2020-01-24 17:30:13 +08:00
tperry-r7
3518b9465c
Merge pull request #12831 from h00die/doc_cleanup
...
Documentation standardization. This is the first step in standardizing the module documentation.
2020-01-22 14:53:12 -06:00
Brent Cook
6f6cc00871
Land #12751 , add Linux RDS socket NP deref privesc
2020-01-22 07:08:47 -06:00
Shelby Pace
e7e42b7a59
Land #12768 , add dlink command injection module
2020-01-21 07:37:43 -06:00
h00die
ca59b06fd3
module doc standardizations
2020-01-20 21:26:59 -05:00
mattaberegg
67ae211845
Grammar change in documentation
2020-01-19 14:14:49 -08:00
Brendan Coles
19b1f567b2
Update AF_PACKET chocobo_root Privilege Escalation module
2020-01-19 11:51:01 +00:00
mattaberegg
195d699df0
Add module documentation.
2020-01-18 19:06:59 -08:00
Brendan Coles
36b6ceb56f
Add rds_atomic_free_op_null_pointer_deref_priv_esc (CVE-2018-5333)
2020-01-18 08:34:52 +00:00
secenv
09801b2507
Add router module/firmware version tested
...
... under Scenarios, as suggested by @space-r7
2020-01-17 20:57:44 -03:00
secenv
52c7bf6375
Add "Verification Steps"
...
as suggested by @space-r7.
2020-01-17 20:48:37 -03:00
secenv
7fbdf0ca57
documentation: s/Setup/Vulnerable Application/
...
Co-Authored-By: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2020-01-17 20:35:27 -03:00
secenv
bd8840fb09
documentation: s/Usage/Scenarios/
...
Co-Authored-By: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2020-01-17 20:32:27 -03:00
secenv
c0800f4742
Fix typo in documentation
...
Co-Authored-By: Shelby Pace <40177151+space-r7@users.noreply.github.com >
2020-01-17 20:31:47 -03:00
h00die
50881c899a
h1 to h2
2020-01-16 11:46:36 -05:00
h00die
f970ea7963
example output to scenarios
2020-01-16 11:41:12 -05:00
h00die
e4013846d3
more standardizations
2020-01-16 11:32:02 -05:00
h00die
947102e2fe
sample output to scenarios
2020-01-16 11:15:06 -05:00
h00die
b2e0950bba
caps
2020-01-16 11:09:29 -05:00
h00die
a1978c76a6
fix up spaces on options header
2020-01-16 10:52:13 -05:00
h00die
4b0ab94043
module options to options
2020-01-16 10:49:22 -05:00
h00die
2fff1f66e9
vulnerable application h1 to h2
2020-01-16 10:44:35 -05:00
h00die
3a4209a092
verification to verification steps
2020-01-16 10:41:12 -05:00
h00die
c904b9d2f2
scenario to scenarios
2020-01-16 10:36:38 -05:00
Shelby Pace
429329c45d
Land #12801 , add WePresent cmd injection module
2020-01-14 08:29:40 -06:00
Jacob Baines
0308f76bbd
Switched to vars_post in send_request_cgi and removed unnecessary documentation
2020-01-14 05:42:06 -05:00
William Vu
5c4189fdb4
Move unix/webapp/webmin_backdoor to linux/http
2020-01-14 00:50:04 -06:00
William Vu
4cbbe23b11
Improve wording in doc
2020-01-13 21:02:56 -06:00
William Vu
b4550933bb
Update module doc
2020-01-13 20:51:58 -06:00
William Vu
a45821b706
Rename module
2020-01-13 20:25:07 -06:00
secenv
eaddce910f
Documentation for dlink_dir859_subscribe_exec
2020-01-13 13:27:42 -03:00
Jacob Baines
caa02c7d2e
Added exploit module for CVE-2019-3929
2020-01-09 08:03:52 -05:00
Nicholas Starke
ce09435d82
Fixing module documentation
2020-01-05 10:03:24 -06:00
h00die
f822a13926
update rds docs
2020-01-04 12:47:36 -05:00
Brendan Coles
a7b63557db
Notify operator that cleanup of crontab is required
2019-12-26 16:21:44 +00:00
Nicholas Starke
13cadbf3f1
Adding DLINK DWL-2600 Command Injection Module
...
This module takes advantage of a previously discovered command injection
vulnerability in DLINK DWL-2600 WiFi Access points. This vulnerability
is authenticated, and the module is responsible for retrieving a valid
authentication token.
2019-12-24 12:31:49 -06:00