h00die
|
7fd82b89df
|
offload files to data
|
2024-11-22 15:57:18 -05:00 |
|
h00die
|
94e5e49052
|
ubuntu needrestart lpe
|
2024-11-22 15:44:45 -05:00 |
|
jheysel-r7
|
d95d549992
|
Land #19531 ProjectSend r1335 - r1605 RCE module
|
2024-11-21 09:53:36 -08:00 |
|
ostrichgolf
|
68eb6599fd
|
Create projectsend_unauth_rce
|
2024-11-21 09:34:58 -08:00 |
|
jheysel-r7
|
afbbba09e8
|
Land #19584 Judge0 sandbox escape CVE-2024-28185, CVE-2024-28189
|
2024-11-20 14:35:38 -08:00 |
|
Takah1ro
|
da6f8cd552
|
Add Judge0 module and document
|
2024-11-20 14:15:38 -08:00 |
|
Spencer McIntyre
|
5d9add4450
|
Merge pull request #19640 from jheysel-r7/pyload_js2py_cve_2024_39205
Pyload RCE (CVE-2024-39205) with js2py sandbox escape (CVE-2024-28397)
|
2024-11-15 09:24:37 -05:00 |
|
Jack Heysel
|
d2ef3cb6a9
|
Pyload RCE (CVE-2024-39205) with js2py sandbox escape (CVE-2024-28397)
|
2024-11-12 16:05:07 -08:00 |
|
Brendan
|
19e182ce65
|
Land #19557, Add Palo Alto Expedition RCE (CVE-2024-5910 & CVE-2024-9464) Module
Palo Alto Expedition RCE (CVE-2024-5910 & CVE-2024-9464) Module
|
2024-11-12 16:42:06 -06:00 |
|
h4x-x0r
|
a09ca39dee
|
Update documentation/modules/exploit/linux/http/paloalto_expedition_rce.md
Co-authored-by: Brendan <bwatters@rapid7.com>
|
2024-11-12 09:03:51 -06:00 |
|
h4x-x0r
|
61486cd877
|
Update documentation/modules/exploit/linux/http/paloalto_expedition_rce.md
Co-authored-by: Brendan <bwatters@rapid7.com>
|
2024-11-12 09:03:35 -06:00 |
|
h4x-x0r
|
661075a45c
|
handling additional case
handling additional case when autocheck is disabled and no credentials are provided
|
2024-10-22 03:42:39 +01:00 |
|
Diego Ledda
|
59d026acd3
|
Land #19544, Magento Arbitrary File Read (CVE-2024-34102) + PHP Buffer Overflow iconv() of GLIBC (CVE-2024-2961)
|
2024-10-18 14:39:54 +02:00 |
|
adfoster-r7
|
7b400f18fe
|
Fix metabase rce to support older versions
|
2024-10-17 10:10:50 +01:00 |
|
h4x-x0r
|
34538df83c
|
PoC and Documentation
PoC and Documentation
|
2024-10-14 05:09:29 +01:00 |
|
Jack Heysel
|
44b33b8010
|
Fixed multiple sessions and instability
|
2024-10-10 11:36:16 -07:00 |
|
Jack Heysel
|
dab5d66e37
|
Test and respond to comments
|
2024-10-09 22:52:55 -07:00 |
|
Jack Heysel
|
a4ef40a233
|
Updated docs with Options section
|
2024-10-09 13:08:20 -07:00 |
|
Jack Heysel
|
e8711c5b20
|
Magento XXE to GLIBC buffer overflow
|
2024-10-09 12:53:29 -07:00 |
|
dledda-r7
|
3211edd83c
|
docs: review changes
|
2024-10-09 12:18:35 -04:00 |
|
dledda-r7
|
2762132830
|
docs: adding motd_persistence docs
|
2024-10-08 11:22:13 -04:00 |
|
jheysel-r7
|
1cdaeac843
|
Land #19463 Add Acronis Cyber Default Password RCE
This adds an RCE module Acronis Cyber Infrastructure Default Password [CVE-2023-45249]
|
2024-10-02 16:02:50 -04:00 |
|
h00die-gr3y
|
c43a4f4b0b
|
Fixed cluster ID issue
|
2024-09-26 21:53:27 +00:00 |
|
Brendan
|
dbc020a745
|
Merge pull request #19441 from Takahiro-Yoko/cve_2023_0386_priv_esc
Land #19441, Add module: Linux Priv Esc (OverlayFS copying bug) CVE-2023-0386
|
2024-09-26 14:07:17 -05:00 |
|
h00die-gr3y
|
589b0f8331
|
updated documentation
|
2024-09-20 10:29:17 +00:00 |
|
h00die-gr3y
|
8e62f22315
|
fifth release with the option to use your own SSH private key
|
2024-09-20 09:50:13 +00:00 |
|
h00die-gr3y
|
8b197a60f9
|
fourth release addressing review comments of jheysel-r7
|
2024-09-19 20:54:55 +00:00 |
|
h00die-gr3y
|
9971aed96f
|
third release addressing majority of the review comments
|
2024-09-17 19:23:38 +00:00 |
|
H00die.Gr3y
|
d7fa23f30f
|
Apply suggestions from code review
Co-authored-by: bcoles <bcoles@gmail.com>
Co-authored-by: Julien Voisin <jvoisin@users.noreply.github.com>
|
2024-09-17 19:00:48 +02:00 |
|
h00die-gr3y
|
86c8879270
|
Added documentation
|
2024-09-16 19:54:59 +00:00 |
|
Takah1ro
|
6b64640f8b
|
Update doc
|
2024-09-09 21:22:07 +09:00 |
|
Takah1ro
|
b8f1bc3da2
|
Update doc
|
2024-09-09 08:40:08 +09:00 |
|
Takah1ro
|
dc81711301
|
Make timeout user configurable
|
2024-09-06 08:24:14 +09:00 |
|
Takah1ro
|
3d20dd6ddf
|
Add module:
Linux Priv Esc (OverlayFS copying bug) CVE-2023-0386
|
2024-09-05 22:54:55 +09:00 |
|
h4x-x0r
|
6532255600
|
PoC & Documentation
PoC & Documentation
|
2024-08-23 23:21:49 +01:00 |
|
dledda-r7
|
ec5892ff1f
|
Land #19363, Ray Modules CVE-2023-6019 CVE-2023-6020 CVE-2023-48022
|
2024-08-23 04:55:17 -04:00 |
|
Takah1ro
|
52852cea72
|
Add cve ref
|
2024-08-20 12:59:52 +09:00 |
|
Takah1ro
|
209f172aa1
|
Update document
|
2024-08-16 08:56:01 +09:00 |
|
Takah1ro
|
7258ca4fb1
|
Remove unnecessary option for simplicity
|
2024-08-16 08:49:34 +09:00 |
|
Takah1ro
|
ea1b9e925e
|
Delete old three exploits in one module
|
2024-08-15 08:17:36 +09:00 |
|
cgranleese-r7
|
dbc51d1cd4
|
Land #19347, OpenMetadata authentication bypass and SpEL injection exploit chain[CVE-2024-28255 and CVE-2024-28254]
|
2024-08-14 16:06:10 +01:00 |
|
cgranleese-r7
|
36322ff274
|
Land #19348, Apache HugeGraph Gremlin RCE (CVE-2024-27348)
|
2024-08-14 10:06:21 +01:00 |
|
Takah1ro
|
0ffe335660
|
Add module docs
|
2024-08-10 10:59:00 +09:00 |
|
Takah1ro
|
064d463c37
|
Formatting doc
|
2024-08-08 07:45:16 +09:00 |
|
Takah1ro
|
35354c8407
|
Update document
|
2024-08-07 21:20:09 +09:00 |
|
Takah1ro
|
a92b51904a
|
Update document
|
2024-08-07 21:16:32 +09:00 |
|
Takah1ro
|
b7e4247d22
|
Avoid using CVE as option
|
2024-08-07 08:43:57 +09:00 |
|
Takah1ro
|
b487dadf8c
|
Remove explicit return
|
2024-08-05 13:01:11 +09:00 |
|
Takah1ro
|
ab38c83d9c
|
Update module document
|
2024-08-05 08:51:56 +09:00 |
|
Takah1ro
|
93f1362d22
|
Add module document
|
2024-08-05 08:47:29 +09:00 |
|