Christophe De La Fuente
f9077bcd8d
Land #12704 , OpenNetAdmin 18.1.1 Remote Code Execution exploit
2020-02-21 15:49:26 +01:00
Onur ER
e4456c9006
Update opennetadmin_ping_cmd_injection.md
2020-02-21 04:14:21 +03:00
Onur ER
1fe1506b42
Update documentation/modules/exploit/unix/webapp/opennetadmin_ping_cmd_injection.md
...
Co-Authored-By: cdelafuente-r7 <56716719+cdelafuente-r7@users.noreply.github.com >
2020-02-21 03:06:56 +03:00
Adam Galway
65521270ea
Land #12853 , InfiniteWP exploit & mixin upgrades
2020-02-10 11:33:49 +00:00
William Vu
eab1245eef
Update module doc
2020-02-07 12:30:00 -06:00
William Vu
763dbf5d5d
Check WordPress version
2020-02-07 03:14:17 -06:00
William Vu
6c59d7c37c
Refactor module
2020-02-07 01:38:11 -06:00
William Vu
8c07e17912
Update module docs
2020-02-06 15:57:54 -06:00
William Vu
68565f575f
Update module doc
2020-02-06 14:55:41 -06:00
William Vu
62c98710ad
Reword vulnerable commit range
2020-02-06 11:03:20 -06:00
William Vu
95fa8602bc
Refactor modules that use Expect
2020-02-05 21:16:21 -06:00
William Vu
b98c0c6876
Add module doc
2020-02-05 17:01:58 -06:00
William Vu
2fc1eb10a8
Add verification steps to module doc
2020-01-22 17:16:41 -06:00
William Vu
10a5e9292e
Add description header to module doc
2020-01-22 17:08:26 -06:00
William Vu
88b72e6f2e
Update module doc to new standard
2020-01-22 16:48:23 -06:00
tperry-r7
3518b9465c
Merge pull request #12831 from h00die/doc_cleanup
...
Documentation standardization. This is the first step in standardizing the module documentation.
2020-01-22 14:53:12 -06:00
h00die
ca59b06fd3
module doc standardizations
2020-01-20 21:26:59 -05:00
William Vu
972cb545f0
Restore the original PLUGIN_FILE contents
2020-01-18 14:57:41 -06:00
William Vu
cbd949927d
Add WordPress InfiniteWP Client plugin exploit
2020-01-17 20:12:21 -06:00
h00die
947102e2fe
sample output to scenarios
2020-01-16 11:15:06 -05:00
h00die
b2e0950bba
caps
2020-01-16 11:09:29 -05:00
h00die
3a4209a092
verification to verification steps
2020-01-16 10:41:12 -05:00
William Vu
5c4189fdb4
Move unix/webapp/webmin_backdoor to linux/http
2020-01-14 00:50:04 -06:00
Onur ER
3be3a398ae
Update and rename documentation/modules/exploit/linux/http/opennetadmin_ping_cmd_injection.md to documentation/modules/exploit/unix/webapp/opennetadmin_ping_cmd_injection.md
2019-12-14 16:33:13 +03:00
dwelch-r7
41569b78ba
Land #12503 , Add exploit module for Ajenti 2.1.31
2019-12-01 16:13:06 +00:00
Christophe De La Fuente
373d147efd
Land #12555 - Wordpress Plainview Activity Monitor RCE
2019-11-29 11:10:24 +01:00
Onur ER
f93fda79f6
Add Module Documentation
2019-11-18 20:25:56 +03:00
sinn3r
5c6686a105
Land #12532 , Add FusionPBX Command exec.php Command Execution
...
Add FusionPBX Command exec.php Command Execution
2019-11-13 11:33:21 -06:00
sinn3r
66ad5deb47
Land #12531 , Add FusionPBX Operator Panel exec.php Command Execution
...
Add FusionPBX Operator Panel exec.php Command Execution
2019-11-13 11:31:30 -06:00
lle-bout
1d7cdac421
Add Wordpress Plainview Activity Monitor RCE
...
Description:
```
Plainview Activity Monitor Wordpress plugin is vulnerable to OS
command injection which allows an attacker to remotely execute
commands on underlying system. Application passes unsafe user supplied
data to ip parameter into activities_overview.php.
Privileges are required in order to exploit this vulnerability, but
this plugin version is also vulnerable to CSRF attack and Reflected
XSS. Combined, these three vulnerabilities can lead to Remote Command
Execution just with an admin click on a malicious link.
```
2019-11-10 08:27:45 +01:00
Brendan Coles
6dc94bbca9
Update documentation
2019-11-02 22:37:56 +00:00
Brendan Coles
f5afbe7104
Update documentation
2019-11-02 22:35:58 +00:00
Brendan Coles
89b277c360
Add documentation
2019-11-01 23:38:59 +00:00
Brendan Coles
08d51acd18
Update targets
2019-11-01 20:33:23 +00:00
Brendan Coles
73a8381639
Add documentation
2019-11-01 20:12:03 +00:00
Brendan Coles
f3bc8580c0
Add documentation
2019-10-29 15:59:18 +00:00
William Vu
ade9c23772
Don't be lazy and spell out "introduction" in docs
...
This was unfortunately my doing, and then people copied me.
2019-09-30 16:58:00 -05:00
William Vu
d56e7d47b5
Add "analysis"
2019-08-21 17:05:40 -05:00
William Vu
856bf22597
Add module doc
2019-08-21 16:56:23 -05:00
Shelby Pace
030ac60fce
Land #12084 , Add Schneider Encoder Exploit
2019-07-22 12:49:44 -05:00
Shelby Pace
0293e74190
remove extra lines
2019-07-22 12:28:47 -05:00
vitorespf
5732880db6
Update documentation/modules/exploit/unix/http/schneider_electric_net55xx_encoder.md
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-19 10:08:33 -03:00
vitorespf
460e83eb81
Update documentation/modules/exploit/unix/http/schneider_electric_net55xx_encoder.md
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-19 09:56:51 -03:00
vitorespf
be791e551c
Update documentation/modules/exploit/unix/http/schneider_electric_net55xx_encoder.md
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-19 09:56:33 -03:00
vitorespf
4a2388cad7
Update documentation/modules/exploit/unix/http/schneider_electric_net55xx_encoder.md
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-19 09:54:49 -03:00
vitorespf
5f3f6f5b3f
Update documentation/modules/exploit/unix/http/schneider_electric_net55xx_encoder.md
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-07-19 09:54:34 -03:00
vitorespf
6f656e51c4
Add files via upload
2019-07-19 09:21:21 -03:00
Jacob Robles
de40b3e1c4
Land #12062 , Add Laravel PHP RCE CVE-2018-15133
2019-07-12 09:28:33 -05:00
Jacob Robles
0f76729108
Update doc
2019-07-12 08:17:17 -05:00
Jacob Robles
e84379cabe
Refactor
2019-07-12 07:45:24 -05:00