Commit Graph

658 Commits

Author SHA1 Message Date
gwillcox-r7 27ae6c4edd Land #13986, Add CVE-2020-16205 exploit for Geutebruck G-CAM 2020-08-17 09:24:32 -05:00
gwillcox-r7 8f80d9b8b6 Minor updates to the documentation to reflect the fact that the username and password could be something other than root/admin 2020-08-17 09:12:02 -05:00
Spencer McIntyre ea1f3d60f1 Adjust XML whitespace and add commands to the setup docs 2020-08-17 10:03:44 -04:00
William Vu eda222434f Execute commands in a shell 2020-08-14 21:46:34 -05:00
William Vu d3febe3284 Set SSL as a DefaultOption and update RPORT 2020-08-14 21:46:34 -05:00
William Vu 46b6368597 Add Apache OFBiz XML-RPC Java deserialization 2020-08-14 21:46:34 -05:00
ddouhine 5e7c821d6d Update geutebruck_testaction_exec.md 2020-08-14 23:15:12 +02:00
gwillcox-r7 dc21773f10 Apply updates to make the English a bit neater r.e affected versions. Also applied updates to make the markdown have bullet points so it displays better. Finally modified up the module description to explain the actual issue a bit more, but it might still need work 2020-08-13 15:13:55 -05:00
ddouhine 42a2a77a7e Update geutebruck_testaction_exec.md
or now... (forgot the msftidy_docs just before)
2020-08-13 14:29:29 -05:00
ddouhine e4f760691e Update geutebruck_testaction_exec.md
it should be better now :)
2020-08-13 14:29:29 -05:00
ddouhine a14a2fe8d2 Add documentation for Geutebruck G-CAM exploit 2020-08-13 14:29:28 -05:00
bwatters fade2c76b5 Land #13904, Added Module: priviledged docker container escape
Merge branch 'land-13904' into upstream-master
2020-08-04 14:39:17 -05:00
Matthew Rollings f379f56b86 Update documentation/modules/exploit/linux/local/docker_priviledged_container_escape.md
Co-authored-by: bcoles <bcoles@gmail.com>
2020-07-26 09:43:58 +01:00
stealthcopter 09994b3e51 Typos in readme 2020-07-25 12:17:56 +01:00
stealthcopter 3d3dcc503f Added docker priviledged container escape 2020-07-25 12:14:30 +01:00
William Vu d5d4716b1c Update TMSH escape reliability notes
What's strange is that if the stars align, like if the system has been
"used" enough, the exploit is incredibly reliable. Maybe my test
environment is bonkers.
2020-07-17 06:26:00 -05:00
William Vu c082ccd337 Make Meterpreter the default target 2020-07-17 06:10:53 -05:00
William Vu 1ae689ce5f Improve robustness by refactoring error handling
tmshCmd.jsp is extremely unreliable!
2020-07-17 05:23:42 -05:00
kalba-security df42399f61 Add installation instructions to docs 2020-07-09 17:20:07 -04:00
kalba-security 36397a3e8f Add cmdstager support 2020-07-09 15:21:12 -05:00
kalba-security 3eceeca911 Add Pandora FMS Events Remote Code Execution module and docs 2020-07-09 15:21:12 -05:00
William Vu 3ec597ce38 Update module doc 2020-07-07 12:12:38 -05:00
William Vu ac3b31a911 Add module doc 2020-07-06 18:07:52 -05:00
William Vu 08c1402be9 Land #13733, AnyDesk GUI CVE-2020-13160 exploit 2020-07-01 14:47:07 -05:00
Spencer McIntyre a27bf9df38 Fix some grammatical mistakes and set a default target for anydesk 2020-07-01 15:27:33 -04:00
Pedro Ribeiro 9995d13316 Update IBM DRM RCE docs 2020-06-26 11:29:59 +07:00
Pedro Ribeiro eb954da04d Fix IBM DRM SSH docs 2020-06-26 11:26:47 +07:00
h00die 6e93dcf8c2 Land #13645, Trend Micro WebSecurity RCE 2020-06-22 06:51:26 -04:00
h00die 6a3633c2c0 fixing up some styles and such 2020-06-20 12:05:48 -04:00
mdisec 229760a826 Fixing document file and module improvements 2020-06-18 20:11:55 +03:00
Shelby Pace db4006e9f6 Land #13607, add Cayin exploit modules 2020-06-18 10:33:49 -05:00
mdisec ff3e797246 Fixing grammers and adding additional sections 2020-06-18 12:49:53 +03:00
Spencer McIntyre f1c4cecf6d Add module docs for CVE-2020-13160 2020-06-17 11:30:41 -04:00
mdisec a0740f4698 Add trend micro websecurity rce 2020-06-14 20:33:46 +03:00
h00die 4702d87684 cleanup 2020-06-12 10:46:44 -04:00
Christophe De La Fuente 797673fd57 Land #13537, add new module linuxki_rce (CVE-2020-7209) 2020-06-10 11:46:34 +02:00
Numan Türle 9e810cb345 Update linuxki_rce.md 2020-06-10 02:13:38 +03:00
Numan Türle 5483bd983f Update linuxki_rce.md 2020-06-10 01:48:12 +03:00
numanturle d238c00e1c add target 2020-06-07 20:36:01 +03:00
William Vu 32ae47c9a9 Add Cisco UCS Director Cloupia script RCE 2020-06-02 22:13:07 -05:00
numanturle 9ee1718605 fix doc lhost 2020-05-30 04:26:11 +03:00
numanturle e2050393bc modify docs and exploit 2020-05-30 04:23:46 +03:00
William Vu f60e569c1b Add Cisco CML and VIRL-PE advisory to Salt modules
Hat tip @brudis-r7!
2020-05-29 15:24:00 -05:00
numanturle 4921814b85 Add new module linuxki_rce 2020-05-29 18:20:46 +03:00
h00die ad2c0c29bd ghost doc fixes 2020-05-28 07:20:38 -04:00
h00die 7902a8e677 exim_gethostbyname_bof docs 2020-05-28 06:48:28 -04:00
William Vu 06f9099d7f Add BASE_DN and ROOT_KEY to vmdir and Salt modules 2020-05-22 11:16:58 -05:00
bwatters-r7 2d56931663 Land #13287, CVE-2017-15889 Synology DSM < 5.2-5967-5 authenticated root exploit
Merge branch 'land-13487' into upstream-master
2020-05-22 10:07:50 -05:00
h00die 79f0c07bab add docs for 410 2020-05-21 17:43:46 -04:00
Spencer McIntyre ecd3c0f820 Minor doc changes, add module notes and SQLi progress output 2020-05-21 16:31:45 -04:00