Spencer McIntyre
50a2749f97
Merge pull request #20289 from cgranleese-r7/adds-mitre-attack-references
...
Adds support for MITRE ATT&CK References
2025-06-27 11:26:09 -04:00
adfoster-r7
a0bb2d8c89
Merge pull request #20298 from bcoles/modules-SSL
...
Modules: Convert SSL default option to Boolean in several modules
2025-06-26 15:00:59 +01:00
cgranleese-r7
a6cdb6deb9
Adds support for MITRE ATT&CK References
2025-06-25 17:24:47 +01:00
cgranleese-r7
a454217bd4
Update info -d markdown
2025-06-24 11:21:49 +01:00
cgranleese-r7
37388ca1be
Adds sentinel values to modules missing notes
2025-06-23 12:24:58 +01:00
bcoles
b483312eca
Modules: Convert SSL default option to Boolean in several modules
2025-06-23 19:38:36 +10:00
cgranleese-r7
a4b14d8b64
Runs Rubocop to fix layout in modules
2025-06-20 15:18:01 +01:00
bcoles
3272ee0f28
Modules: Convert DisableNops property to Boolean in several modules
2025-06-10 23:57:52 +10:00
h4x-x0r
21b3315229
updated
...
updated
2025-01-29 20:18:05 +00:00
h4x-x0r
37c148cc7c
CVE-2024-47407
...
CVE-2024-47407
2024-11-13 03:55:17 +00:00
h4x-x0r
362b2427dc
Error handling and code cleanup
...
Error handling and code cleanup
2024-08-19 22:47:19 +01:00
h4x-x0r
35cbf63890
Minor fixes
...
Specified a default payload
Randomized date and time
Wrapped cleanup in an ensure block
2024-08-02 16:58:24 +01:00
h4x-x0r
341142dc23
DIAEnergie SQL Injection (CVE-2024-4548) Module
2024-07-30 13:28:10 -04:00
h4x-x0r
14945679ba
Updated email generation part.
2024-07-25 23:54:27 -04:00
h4x-x0r
90ed8ae797
Revised the code to make it cleaner
2024-07-24 22:40:26 -04:00
h4x-x0r
c1bf8df690
Updated the module to take advantage of the check method
2024-07-23 23:52:05 -04:00
h4x-x0r
d7e50cb126
mySCADA MyPRO <= v8.28.0 Command Injection (CVE-2023-28384) exploit module
2024-07-22 16:49:40 -04:00
adfoster-r7
094d6ee36b
Add additional reliability and stability notes to modules
2024-01-22 23:29:57 +00:00
cgranleese-r7
c3a7da54d5
reduces code duplication
2023-04-04 10:27:11 +01:00
h00die
d5ba1afbec
fix URLs not resolving
...
fix URLs not resolving
add csv export to references
fix URLs not resolving
pdf not pd
missed a url change
remove extra recirectedfrom fields
remove extra file
fix ovftool url accidental replacement
2022-02-16 17:22:40 -06:00
adfoster-r7
4a9a15e638
Run Rubocop layout rules on modules
2021-08-27 17:19:43 +01:00
Wes
42df4495a7
abb_wserver_exec - add CVE reference
...
add the cve for this
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5620
https://nvd.nist.gov/vuln/detail/CVE-2019-5620
cve was assigned years after public exploit code
2021-03-17 15:58:21 -04:00
Wes
34674ce174
Update abb_wserver_exec.rb
...
update advisory link
#2708
2021-03-17 09:59:15 -04:00
Alan Foster
b06c5c12aa
Rubocop recently landed modules continued
2021-02-25 14:13:40 +00:00
Alan Foster
5b3fde7735
Rubocop recently landed modules
2021-02-16 15:08:08 +00:00
Spencer McIntyre
1031b12c57
Land #14206 , Rockwell FactoryTalk CVE-2020-12027 RCE
2020-11-20 08:49:39 -05:00
Spencer McIntyre
a5024238d3
Tweak the check method to return detected and fix a typo
2020-11-19 09:24:27 -05:00
Pedro Ribeiro
b56d2e00fe
Update modules/exploits/windows/scada/rockwell_factorytalk_rce.rb
...
Co-authored-by: bcoles <bcoles@gmail.com >
2020-11-19 19:39:59 +07:00
Pedro Ribeiro
c635538e9d
Update modules/exploits/windows/scada/rockwell_factorytalk_rce.rb
...
Co-authored-by: bcoles <bcoles@gmail.com >
2020-11-19 19:39:47 +07:00
Pedro Ribeiro
4c8adcfd46
Update rockwell_factorytalk_rce.rb
2020-11-19 17:56:31 +07:00
Pedro Ribeiro
74387f0859
Update rockwell_factorytalk_rce.rb
2020-10-06 12:29:40 +07:00
Pedro Ribeiro
5a6301cfea
Add blog link
2020-10-06 12:26:28 +07:00
Pedro Ribeiro
4657cb6c4a
remove EOL spaces
2020-10-06 00:33:28 +07:00
Pedro Ribeiro
c405495391
remove begin and add checkcode unknown
2020-10-05 23:44:10 +07:00
Pedro Ribeiro
850c58e902
Update modules/exploits/windows/scada/rockwell_factorytalk_rce.rb
...
Co-authored-by: bcoles <bcoles@gmail.com >
2020-10-05 23:36:59 +07:00
Pedro Ribeiro
bbe80cadd3
Update modules/exploits/windows/scada/rockwell_factorytalk_rce.rb
...
Co-authored-by: bcoles <bcoles@gmail.com >
2020-10-05 23:36:37 +07:00
Pedro Ribeiro
7d17ae6a61
Update modules/exploits/windows/scada/rockwell_factorytalk_rce.rb
...
Co-authored-by: bcoles <bcoles@gmail.com >
2020-10-05 23:35:27 +07:00
Alan Foster
30809787c4
Convert disclosure dates to iso8601
2020-10-02 21:00:37 +01:00
Pedro Ribeiro
2353b3fdaf
Add rockwell sploit
2020-10-01 11:03:50 +07:00
Pedro Ribeiro
74ac85e5d3
revert previous mistake
2020-10-01 10:59:11 +07:00
Pedro Ribeiro
f810f43cf6
changes as requested
2020-08-16 00:02:16 +07:00
Pedro Ribeiro
033cd8031d
Add factorytalk exploit
2020-08-07 22:30:11 +07:00
Brent Cook
8489bcdfd9
This fixes broken links to the community.rapid7.com blog
...
Performed mechanically with sed, spot-checked that the new blog can consume these links.
2020-02-18 09:06:11 -06:00
Dave York
7b14442ab0
replace strings with bools
2020-01-14 20:47:27 -05:00
William Vu
32334c2386
Update all module splats from http:// to https://
2019-08-15 18:10:44 -05:00
William Vu
9ec989a1bd
Address @bcoles' review in #10672
2018-10-08 14:15:21 -05:00
Tod Beardsley
6e10718ed5
Format ZDI ref correctly.
2018-10-08 13:48:52 -05:00
Tod Beardsley
f7d2815a01
Add a ZDI reference
2018-10-08 13:23:50 -05:00
Hubert Lin
22c57d1bf0
chmod 644
2018-09-19 18:19:12 +08:00
Hubert Lin
36fa8f2ffc
Added exploit module for Delta Electronics Delta Industrial Automation COMMGR 1.08 Stack Buffer Overflow.
2018-09-19 15:28:46 +08:00