Commit Graph

261 Commits

Author SHA1 Message Date
Spencer McIntyre 50a2749f97 Merge pull request #20289 from cgranleese-r7/adds-mitre-attack-references
Adds support for MITRE ATT&CK References
2025-06-27 11:26:09 -04:00
adfoster-r7 a0bb2d8c89 Merge pull request #20298 from bcoles/modules-SSL
Modules: Convert SSL default option to Boolean in several modules
2025-06-26 15:00:59 +01:00
cgranleese-r7 a6cdb6deb9 Adds support for MITRE ATT&CK References 2025-06-25 17:24:47 +01:00
cgranleese-r7 a454217bd4 Update info -d markdown 2025-06-24 11:21:49 +01:00
cgranleese-r7 37388ca1be Adds sentinel values to modules missing notes 2025-06-23 12:24:58 +01:00
bcoles b483312eca Modules: Convert SSL default option to Boolean in several modules 2025-06-23 19:38:36 +10:00
cgranleese-r7 a4b14d8b64 Runs Rubocop to fix layout in modules 2025-06-20 15:18:01 +01:00
bcoles 3272ee0f28 Modules: Convert DisableNops property to Boolean in several modules 2025-06-10 23:57:52 +10:00
h4x-x0r 21b3315229 updated
updated
2025-01-29 20:18:05 +00:00
h4x-x0r 37c148cc7c CVE-2024-47407
CVE-2024-47407
2024-11-13 03:55:17 +00:00
h4x-x0r 362b2427dc Error handling and code cleanup
Error handling and code cleanup
2024-08-19 22:47:19 +01:00
h4x-x0r 35cbf63890 Minor fixes
Specified a default payload
Randomized date and time
Wrapped cleanup in an ensure block
2024-08-02 16:58:24 +01:00
h4x-x0r 341142dc23 DIAEnergie SQL Injection (CVE-2024-4548) Module 2024-07-30 13:28:10 -04:00
h4x-x0r 14945679ba Updated email generation part. 2024-07-25 23:54:27 -04:00
h4x-x0r 90ed8ae797 Revised the code to make it cleaner 2024-07-24 22:40:26 -04:00
h4x-x0r c1bf8df690 Updated the module to take advantage of the check method 2024-07-23 23:52:05 -04:00
h4x-x0r d7e50cb126 mySCADA MyPRO <= v8.28.0 Command Injection (CVE-2023-28384) exploit module 2024-07-22 16:49:40 -04:00
adfoster-r7 094d6ee36b Add additional reliability and stability notes to modules 2024-01-22 23:29:57 +00:00
cgranleese-r7 c3a7da54d5 reduces code duplication 2023-04-04 10:27:11 +01:00
h00die d5ba1afbec fix URLs not resolving
fix URLs not resolving

add csv export to references

fix URLs not resolving

pdf not pd

missed a url change

remove extra recirectedfrom fields

remove extra file

fix ovftool url accidental replacement
2022-02-16 17:22:40 -06:00
adfoster-r7 4a9a15e638 Run Rubocop layout rules on modules 2021-08-27 17:19:43 +01:00
Wes 42df4495a7 abb_wserver_exec - add CVE reference
add the cve for this

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5620
https://nvd.nist.gov/vuln/detail/CVE-2019-5620

cve was assigned years after public exploit code
2021-03-17 15:58:21 -04:00
Wes 34674ce174 Update abb_wserver_exec.rb
update advisory link 

#2708
2021-03-17 09:59:15 -04:00
Alan Foster b06c5c12aa Rubocop recently landed modules continued 2021-02-25 14:13:40 +00:00
Alan Foster 5b3fde7735 Rubocop recently landed modules 2021-02-16 15:08:08 +00:00
Spencer McIntyre 1031b12c57 Land #14206, Rockwell FactoryTalk CVE-2020-12027 RCE 2020-11-20 08:49:39 -05:00
Spencer McIntyre a5024238d3 Tweak the check method to return detected and fix a typo 2020-11-19 09:24:27 -05:00
Pedro Ribeiro b56d2e00fe Update modules/exploits/windows/scada/rockwell_factorytalk_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-11-19 19:39:59 +07:00
Pedro Ribeiro c635538e9d Update modules/exploits/windows/scada/rockwell_factorytalk_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-11-19 19:39:47 +07:00
Pedro Ribeiro 4c8adcfd46 Update rockwell_factorytalk_rce.rb 2020-11-19 17:56:31 +07:00
Pedro Ribeiro 74387f0859 Update rockwell_factorytalk_rce.rb 2020-10-06 12:29:40 +07:00
Pedro Ribeiro 5a6301cfea Add blog link 2020-10-06 12:26:28 +07:00
Pedro Ribeiro 4657cb6c4a remove EOL spaces 2020-10-06 00:33:28 +07:00
Pedro Ribeiro c405495391 remove begin and add checkcode unknown 2020-10-05 23:44:10 +07:00
Pedro Ribeiro 850c58e902 Update modules/exploits/windows/scada/rockwell_factorytalk_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-10-05 23:36:59 +07:00
Pedro Ribeiro bbe80cadd3 Update modules/exploits/windows/scada/rockwell_factorytalk_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-10-05 23:36:37 +07:00
Pedro Ribeiro 7d17ae6a61 Update modules/exploits/windows/scada/rockwell_factorytalk_rce.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-10-05 23:35:27 +07:00
Alan Foster 30809787c4 Convert disclosure dates to iso8601 2020-10-02 21:00:37 +01:00
Pedro Ribeiro 2353b3fdaf Add rockwell sploit 2020-10-01 11:03:50 +07:00
Pedro Ribeiro 74ac85e5d3 revert previous mistake 2020-10-01 10:59:11 +07:00
Pedro Ribeiro f810f43cf6 changes as requested 2020-08-16 00:02:16 +07:00
Pedro Ribeiro 033cd8031d Add factorytalk exploit 2020-08-07 22:30:11 +07:00
Brent Cook 8489bcdfd9 This fixes broken links to the community.rapid7.com blog
Performed mechanically with sed, spot-checked that the new blog can consume these links.
2020-02-18 09:06:11 -06:00
Dave York 7b14442ab0 replace strings with bools 2020-01-14 20:47:27 -05:00
William Vu 32334c2386 Update all module splats from http:// to https:// 2019-08-15 18:10:44 -05:00
William Vu 9ec989a1bd Address @bcoles' review in #10672 2018-10-08 14:15:21 -05:00
Tod Beardsley 6e10718ed5 Format ZDI ref correctly. 2018-10-08 13:48:52 -05:00
Tod Beardsley f7d2815a01 Add a ZDI reference 2018-10-08 13:23:50 -05:00
Hubert Lin 22c57d1bf0 chmod 644 2018-09-19 18:19:12 +08:00
Hubert Lin 36fa8f2ffc Added exploit module for Delta Electronics Delta Industrial Automation COMMGR 1.08 Stack Buffer Overflow. 2018-09-19 15:28:46 +08:00