adfoster-r7
|
a0bb2d8c89
|
Merge pull request #20298 from bcoles/modules-SSL
Modules: Convert SSL default option to Boolean in several modules
|
2025-06-26 15:00:59 +01:00 |
|
cgranleese-r7
|
04a18fb3ca
|
Updates modules to remove non-printable chars
|
2025-06-25 14:19:56 +01:00 |
|
bcoles
|
b483312eca
|
Modules: Convert SSL default option to Boolean in several modules
|
2025-06-23 19:38:36 +10:00 |
|
bcoles
|
6ee7d56b1a
|
modules/auxiliary/admin/http: Resolve RuboCop violations
|
2025-05-16 01:16:37 +10:00 |
|
jheysel-r7
|
08e227faca
|
Merge pull request #19934 from sfewer-r7/bugfix-cisco-iosxe-rce
Improve exploit/linux/misc/cisco_ios_xe_rce (CVE-2023-20198 + CVE-2023-20273)
|
2025-03-27 16:51:16 -07:00 |
|
sfewer-r7
|
efb0d5da4c
|
fix typo, C1000v should be CSR1000v. Be consistant with IOS XE and not IOS-XE.
|
2025-03-04 09:09:32 +00:00 |
|
sfewer-r7
|
e71a851e3f
|
mention that the C8000v series appliance version 17.6.5 was observed to not be vulnerable to CVE-2023-20273. Inspecting the Lua code shows this appliance has additional command injection filtering in place (see pexec_setsid in /usr/binos/openresty/nginx/conf/pexec.lua) which prevents the injection from working
|
2025-03-03 20:22:46 +00:00 |
|
cgranleese-r7
|
0017fbdf56
|
Updates more dead links
|
2025-02-28 10:30:14 +00:00 |
|
cgranleese-r7
|
810e7c4518
|
Adds scripts to find and replace dead module reference links
|
2025-02-28 09:20:48 +00:00 |
|
h00die
|
1906646e67
|
peer review
|
2024-11-28 13:18:47 -05:00 |
|
h00die
|
2b593bcf54
|
wp_post_smtp_acct_takeover peer review
|
2024-11-03 13:52:55 -05:00 |
|
h00die
|
9da5177d11
|
remove old code
|
2024-10-29 16:44:48 -04:00 |
|
h00die
|
41ed44864f
|
wp_post_smtp_acct_takeover
|
2024-10-29 16:44:20 -04:00 |
|
h00die
|
4feb12ab4a
|
untested code
|
2024-10-29 16:44:20 -04:00 |
|
jheysel-r7
|
05ff8359b8
|
Merge pull request #19436 from h4x-x0r/CVE-2024-6670
WhatsUp Gold SQL Injection (CVE-2024-6670) Module
|
2024-09-26 17:04:30 -04:00 |
|
h4x-x0r
|
c20b1d8a03
|
minor fixes
minor fixes
|
2024-09-26 04:01:36 +01:00 |
|
jheysel-r7
|
d11c2be4ea
|
Merge pull request #19375 from h4x-x0r/CVE-2024-20419
Cisco Smart Software Manager (SSM) On-Prem Account Takeover (CVE-2024-20419) Module
|
2024-09-24 12:19:54 -04:00 |
|
Jack Heysel
|
f254eeb65e
|
Added error handling
|
2024-09-23 14:16:26 -07:00 |
|
h4x-x0r
|
322188a112
|
Refactoring
Refactored code to remove duplicate requests
|
2024-09-23 13:29:46 +01:00 |
|
h4x-x0r
|
05f591d005
|
Cleanup and check method added
Cleanup and check method added
|
2024-09-12 15:43:20 +01:00 |
|
h4x-x0r
|
75627ccba7
|
Update whatsup_gold_sqli.rb
|
2024-09-02 15:45:45 +01:00 |
|
h4x-x0r
|
fdd740b235
|
cleanup
cleanup
|
2024-09-02 15:44:27 +01:00 |
|
h4x-x0r
|
64f595c431
|
cleanup, version check, documentation
cleanup, version check, documentation
|
2024-09-02 15:41:08 +01:00 |
|
h4x-x0r
|
686da13ff5
|
WhatsUp Gold SQL Injection (CVE-2024-6670)
WhatsUp Gold SQL Injection (CVE-2024-6670)
|
2024-09-02 16:09:10 +01:00 |
|
bwatters
|
4af2294709
|
Land #19386, Ivanti Virtual Traffic Manager (vTM) Authentication Bypass (CVE-2024-7593) Module
Merge branch 'land-19386' into upstream-master
|
2024-08-27 09:39:10 -05:00 |
|
bwatters
|
84431b0a4e
|
Land #19380, Control iD iDSecure Authentication Bypass (CVE-2023-6329) Module
Merge branch 'land-19380' into upstream-master
|
2024-08-26 18:09:09 -05:00 |
|
h4x-x0r
|
3f3690bebb
|
code cleanup
code cleanup
|
2024-08-19 21:17:16 +01:00 |
|
h4x-x0r
|
9690f01df6
|
code cleanup
code cleanup
|
2024-08-19 16:25:50 +01:00 |
|
h4x-x0r
|
82f51bb9b7
|
code cleanup
code cleanup
|
2024-08-16 15:43:34 +01:00 |
|
h4x-x0r
|
5a94869809
|
cleanup
cleanup
|
2024-08-16 14:12:41 +01:00 |
|
h4x-x0r
|
3577ae8ffb
|
Code cleanup
Code cleanup
|
2024-08-16 13:57:38 +01:00 |
|
h4x-x0r
|
8ad328a510
|
Code cleanup
Code cleanup
|
2024-08-16 07:07:16 +01:00 |
|
h4x-x0r
|
947cefe43a
|
Fixed get_cookies
Fixed get_cookies
|
2024-08-14 17:42:11 +01:00 |
|
h4x-x0r
|
765e9b9ae4
|
Improved error handling
Improved error handling
|
2024-08-14 17:25:36 +01:00 |
|
h4x-x0r
|
ea2b5920ac
|
cleanup
cleanup
|
2024-08-14 06:44:43 +01:00 |
|
h4x-x0r
|
9c72a85134
|
Verified more versions
Verified exploit against more affected versions
|
2024-08-14 06:33:45 +01:00 |
|
h4x-x0r
|
75201b0892
|
Updated references
references, affected versions, credits
|
2024-08-14 05:15:36 +01:00 |
|
h4x-x0r
|
7bfc386973
|
Updated
added error handling, documentation, version check, store_valid_credential
|
2024-08-14 04:57:08 +01:00 |
|
h4x-x0r
|
be62cc97a7
|
Auth Bypass
Auth Bypass
|
2024-08-14 02:00:06 +01:00 |
|
h4x-x0r
|
17149db5a3
|
code cleanup
code cleanup
|
2024-08-13 23:23:35 +01:00 |
|
h4x-x0r
|
b96bc116f5
|
Code cleanup
Code cleanup
|
2024-08-13 23:18:26 +01:00 |
|
h4x-x0r
|
c53e5d3c4e
|
Code cleanup and added store_valid_credential
added store_valid_credential
code cleanup
|
2024-08-13 23:12:50 +01:00 |
|
h4x-x0r
|
733e2ab9fc
|
Added store_valid_credential
Added store_valid_credential
|
2024-08-13 23:00:13 +01:00 |
|
h4x-x0r
|
14e4a11d24
|
Added store_valid_credential
Added store_valid_credential
|
2024-08-13 20:54:56 +01:00 |
|
h4x-x0r
|
26d6347919
|
Code cleanup
Code cleanup
|
2024-08-11 06:15:24 +01:00 |
|
h4x-x0r
|
5fa18a66ee
|
Control iD iDSecure Authentication Bypass (CVE-2023-6329) Module
Control iD iDSecure Authentication Bypass (CVE-2023-6329) Module
|
2024-08-11 05:41:07 +01:00 |
|
h4x-x0r
|
8a72124e9d
|
Code cleanup and error handling added
Code cleanup and error handling added
|
2024-08-09 21:11:20 +01:00 |
|
h4x-x0r
|
4384d32c83
|
Cisco SSM On-Prem Account Takeover (CVE-2024-20419)
Cisco SSM On-Prem Account Takeover (CVE-2024-20419)
|
2024-08-09 18:59:54 +01:00 |
|
h4x-x0r
|
8bef9b5f72
|
Fortra FileCatalyst Workflow SQL Injection (CVE-2024-5276)
Fortra FileCatalyst Workflow SQL Injection (CVE-2024-5276)
|
2024-08-08 17:52:38 +01:00 |
|
adfoster-r7
|
62a3f73e70
|
Update rubocop target ruby version
|
2024-07-24 16:47:17 +01:00 |
|