Commit Graph

26 Commits

Author SHA1 Message Date
h00die 68d647edf1 Merge branch 'master' of https://github.com/rapid7/metasploit-framework into op5 2016-06-01 18:05:18 -04:00
h00die 52d5028548 op5 config exec 2016-06-01 15:07:31 -04:00
Brent Cook cf0176e68b Land #6867, Add Dell SonicWALL Scrutinizer 11.0.1 MethodDetail SQL Injection 2016-05-16 19:00:10 -05:00
Brent Cook 21d74a64fe Land #6874, Improve exploit for CVE-2016-0854 2016-05-14 11:08:17 -05:00
wchen-r7 9114e01ed9 update doc 2016-05-13 23:31:38 -05:00
Brent Cook a940481f62 Land #6834, Authorized FTP JCL exploit for z/OS 2016-05-13 21:29:45 -05:00
wchen-r7 3b5db26ff5 Fix #6872, change upload action for CVE-2016-0854 exploit
This patch includes the following changes:

* Instead of the uploadFile action, this patch uses uploadImageCommon
  to be able to support both Advantech WebAccess builds: 2014 and
  2015.
* It uses an explicit check instead of the passive version check.
* It cleans up the malicious file after getting a session.
* Added module documentation to explain the differences between
  different builds of Advantech WebAccess 8.0s, and 8.1.

Fix #6872
2016-05-13 19:47:18 -05:00
Bigendian Smalls 2d5cf6cfe4 Authorized FTP JCL exploit for z/OS
This exploit module allows a user with credentials to execute JCL on a
vulnerable mainframe system running z/OS and an appropriately configured
FTP server.
2016-05-12 14:46:31 -05:00
wchen-r7 756673fcd7 Fix another typo 2016-05-12 00:13:53 -05:00
wchen-r7 9d128cfd9f Add Dell SonicWALL Scrutinizer 11.0.1 MethodDetail SQL Injection 2016-05-11 22:27:18 -05:00
wchen-r7 027855def4 Add module documentation for struts_dmi_exec 2016-05-02 15:43:34 -05:00
tdoan-r7 7e5fced46b MS-1196 Minor edits to the kb for the web_delivery module 2016-03-22 12:26:55 -05:00
tdoan-r7 4c42a74d48 MS-1195 minor grammatical edits to psexec kb 2016-03-21 14:18:16 -05:00
wchen-r7 698f425821 Auto <hr> 2016-03-08 11:25:15 -06:00
wchen-r7 03eb568af7 Add --- to make sections to stand out more 2016-03-05 15:17:19 -06:00
wchen-r7 f4866fd5f0 Update template and web_delivery doc 2016-03-03 01:27:14 -06:00
wchen-r7 11964c5c1a Add remote exploit demo and web_delivery doc 2016-03-02 19:52:11 -06:00
wchen-r7 eede7c9193 Link to WbemExec writeup 2016-03-02 11:05:33 -06:00
wchen-r7 e615e1072e Update information about SMBv1 2016-03-02 10:51:45 -06:00
wchen-r7 d4c433e29f Update psexec.md 2016-03-01 19:29:25 -06:00
wchen-r7 876a5b55f9 Update psexec.md 2016-03-01 19:06:40 -06:00
wchen-r7 f27d24fd60 Add module documentation for psexec 2016-03-01 18:52:47 -06:00
wchen-r7 99d593e9a0 missing an of 2016-03-01 15:11:29 -06:00
wchen-r7 552f2a148b Add documentation for ms08_067_netapi 2016-03-01 15:09:30 -06:00
wchen-r7 3125c99e45 Remove this fake doc 2016-02-24 15:17:18 -06:00
wchen-r7 509a1e8de1 Add manual for demo purposes 2016-02-16 23:18:29 -06:00