yaumn
|
7812e0037b
|
Update modules/exploits/linux/local/exim4_deliver_message_priv_esc.rb
Co-Authored-By: bcoles <bcoles@gmail.com>
|
2019-07-10 17:24:13 +01:00 |
|
yaumn
|
af89433c1d
|
Update modules/exploits/linux/local/exim4_deliver_message_priv_esc.rb
Co-Authored-By: bcoles <bcoles@gmail.com>
|
2019-07-10 17:23:50 +01:00 |
|
yaumn
|
9ffbfe0985
|
Update modules/exploits/linux/local/exim4_deliver_message_priv_esc.rb
Co-Authored-By: bcoles <bcoles@gmail.com>
|
2019-07-10 17:23:38 +01:00 |
|
yaumn
|
a06dffa174
|
Update modules/exploits/linux/local/exim4_deliver_message_priv_esc.rb
Co-Authored-By: bcoles <bcoles@gmail.com>
|
2019-07-10 17:22:52 +01:00 |
|
Guillaume Andre
|
5d52b0326b
|
Add better checks at the beginning of the exploit.
Change-Id: Ib80907f03f15b6c0cf32b48f059cf042e4d6a91f
|
2019-07-10 11:33:09 +01:00 |
|
Guillaume Andre
|
b68383141c
|
Added Qualys and dhn to credits. Set suid bit of payload instead of shell launcher. Print detected exim version
Change-Id: I61805a4d2b6f7f8a268b677c3c6f1d76ada034da
|
2019-07-09 16:51:14 +01:00 |
|
yaumn
|
df46faf71f
|
Finish documentation. Exploit is stable.
|
2019-07-07 23:58:29 +01:00 |
|
yaumn
|
7b2a1b67ed
|
Add a documentation file
|
2019-07-07 00:25:54 +01:00 |
|
yaumn
|
a5843e48a9
|
Basic reverse shell does not disconnect anymore
|
2019-07-06 00:53:33 +01:00 |
|
Guillaume Andre
|
4c2cacd7d6
|
Add meterpreter support
|
2019-07-05 16:53:39 +01:00 |
|
yaumn
|
2c8ad0e357
|
First tests with meterpreter sockets
|
2019-07-05 01:04:15 +01:00 |
|
yaumn
|
74eb74e606
|
Pipe method with netcat now works
|
2019-07-04 23:15:23 +01:00 |
|
Guillaume Andre
|
e4c27d3eab
|
Clean pipe file
Change-Id: Ibc78639ad44eb56ffa26fcfb4f656b5a78dbf76a
|
2019-07-04 16:20:13 +01:00 |
|
Guillaume Andre
|
3c0b581371
|
Clean code
Change-Id: I83287dcd52c4ba566396a0ff7e4f3c3125d12bb0
|
2019-07-04 16:16:27 +01:00 |
|
Guillaume Andre
|
9b378ceb71
|
Add options. Add pipe netcat method
Change-Id: I0c401add1c2ff76e3e2c3d82a8fb7f74db405a1f
|
2019-07-04 15:02:03 +01:00 |
|
yaumn
|
bddfef0cac
|
Add options. Exploits now works with both setuid and nc methods
|
2019-07-04 00:16:28 +01:00 |
|
yaumn
|
bb58160d10
|
Exploits now also works with netcat
|
2019-07-03 14:30:23 +01:00 |
|
yaumn
|
4f1d9af5fd
|
Add netcat method (still buggy though)
|
2019-07-03 14:30:23 +01:00 |
|
Guillaume Andre
|
a2411a1d63
|
First version of the exploit is now working
Change-Id: Idf6b6d773cf71c477fe68885313f5f98d74d9c11
|
2019-07-03 14:30:23 +01:00 |
|
Guillaume Andre
|
bef6425d0e
|
First commit
Change-Id: If751eb1753fc8991fe7971c7123a203734396a46
|
2019-07-03 14:30:23 +01:00 |
|
bcoles
|
c7ff78c277
|
Remove spaces at EOL
|
2019-06-29 14:01:18 +10:00 |
|
Brendan Coles
|
203e3b74db
|
Add Serv-U FTP Server prepareinstallation Privilege Escalation
|
2019-06-29 03:52:53 +00:00 |
|
William Vu
|
0a00f3851a
|
Land #12007, true 0s timeout in send_request_*
|
2019-06-28 12:32:32 -05:00 |
|
William Vu
|
cc3fd747aa
|
Add Pen Test Partners reference
Did we somehow miss this?
|
2019-06-26 11:05:22 -05:00 |
|
Wei Chen
|
685fb55179
|
Land #11987, Add Nagios XI 5.5.6 magpie_debug Root Exploit
|
2019-06-25 16:17:50 -05:00 |
|
Wei Chen
|
23dbc4d90d
|
Change file name
|
2019-06-25 16:10:44 -05:00 |
|
Wei Chen
|
e9fc9970ba
|
Make names more random. Also, make metadata changes
|
2019-06-25 16:09:15 -05:00 |
|
Quentin Kaiser
|
94dd2b1800
|
Fix disclosure date format.
Co-Authored-By: @shellfail <jrobles@rapid7.com>
|
2019-06-25 20:50:56 +02:00 |
|
William Vu
|
7739e9f43e
|
Update my modules
|
2019-06-24 13:38:14 -05:00 |
|
Wei Chen
|
a93a520c3a
|
Land #11960, Add LPE for Cisco Prime Infrastructure's runrshell exe
|
2019-06-19 10:49:17 -05:00 |
|
Wei Chen
|
c637755ebd
|
Land #11956 - Add Cisco Prime Infrastructure Health Monitor Tar RCE
|
2019-06-19 10:46:35 -05:00 |
|
Shelby Pace
|
ddf7eadeee
|
modified version check
|
2019-06-19 08:31:48 -05:00 |
|
Wei Chen
|
384cfc7db5
|
update checkcode
|
2019-06-18 15:58:57 -05:00 |
|
Shelby Pace
|
d4d2eab770
|
removed some whitespace, added a check
|
2019-06-17 15:29:08 -05:00 |
|
Özkan Mustafa Akkuş
|
a5020b8f30
|
Fix spaces at EOL
|
2019-06-17 13:16:56 +03:00 |
|
Özkan Mustafa Akkuş
|
b5e34cb783
|
Converting version check request to vars_get
We also need to add the "testing = 1" cookie to the login request. Otherwise, the browser displays a No-Cookie error.
|
2019-06-17 10:46:46 +03:00 |
|
yaumn
|
e13456ce0d
|
Add root to the filename
|
2019-06-16 23:32:57 +01:00 |
|
siberguvenlik
|
17f686a87d
|
Adding module documentation
|
2019-06-16 18:27:01 -04:00 |
|
yaumn
|
8faa138289
|
Change targets and default http delay
|
2019-06-16 23:13:45 +01:00 |
|
siberguvenlik
|
3d463a1e20
|
Adding correction of Check and Payload definitions
|
2019-06-16 17:58:31 -04:00 |
|
yaumn
|
863beaea92
|
First commit for module Nagios XI RCE
|
2019-06-16 22:10:32 +01:00 |
|
siberguvenlik
|
414c614b55
|
CVE-2019-12840 - Add Webmin 1.910 RCE Module
|
2019-06-16 11:26:00 -04:00 |
|
Wei Chen
|
d74881a3c0
|
Update based on bcole's feedback
|
2019-06-10 12:12:49 -05:00 |
|
Wei Chen
|
caa9987a77
|
Register payload for cleanup
|
2019-06-10 11:20:25 -05:00 |
|
Wei Chen
|
d63484562c
|
Correct disclosure date
|
2019-06-10 11:14:41 -05:00 |
|
Wei Chen
|
12cfada465
|
Add Cisco Prime Infrastructure runrshell Privilege Escalation
|
2019-06-10 10:29:43 -05:00 |
|
Brendan Coles
|
8cac968acb
|
Fix abrt package version check
|
2019-06-10 02:21:10 +00:00 |
|
Pedro Ribeiro
|
6693e3e347
|
add cve to trueonline v2
|
2019-06-08 17:41:04 +07:00 |
|
Pedro Ribeiro
|
903ea5ebce
|
add cve to p660hn v1
|
2019-06-08 17:38:44 +07:00 |
|
Pedro Ribeiro
|
c763f84348
|
add cve to billion module
|
2019-06-08 17:37:05 +07:00 |
|