Nuri Çilengir
|
bdf8defe53
|
Apply suggestions from code review
|
2022-07-25 16:03:09 +00:00 |
|
Nuri Çilengir
|
bc0b27e1e2
|
Apply suggestions from code review
Co-authored-by: Grant Willcox <63261883+gwillcox-r7@users.noreply.github.com>
|
2022-07-22 12:58:46 +00:00 |
|
Nuri Çilengir
|
fc3b08fb8b
|
Apply suggestions from code review
Co-authored-by: Grant Willcox <63261883+gwillcox-r7@users.noreply.github.com>
|
2022-07-22 12:51:40 +00:00 |
|
Nuri Çilengir
|
420e67aca9
|
Apply suggestions from code review
Co-authored-by: Grant Willcox <63261883+gwillcox-r7@users.noreply.github.com>
|
2022-07-22 12:24:43 +00:00 |
|
Nuri Çilengir
|
628f5970b1
|
Apply suggestions from code review
Co-authored-by: Grant Willcox <63261883+gwillcox-r7@users.noreply.github.com>
|
2022-07-22 12:24:26 +00:00 |
|
Nuri Çilengir
|
135a25be4d
|
Tested and fixed problems
|
2022-07-21 11:42:18 +00:00 |
|
Grant Willcox
|
336a1feaf7
|
Fix up naming of module and documentation and fix most of the RuboCop and formatting errors
|
2022-07-19 15:44:52 -05:00 |
|
Nuri Çilengir
|
d2769ef82b
|
Add Roxy-WI exec
|
2022-07-19 21:08:45 +03:00 |
|
Spencer McIntyre
|
63734832b2
|
Add sourcegraph RCE module docs
|
2022-07-08 17:27:27 -04:00 |
|
Spencer McIntyre
|
27ad62c964
|
Add a decent check method
|
2022-07-08 16:40:42 -04:00 |
|
Jake Baines
|
39567281bf
|
Revised setup guidance
|
2022-05-13 13:41:05 -07:00 |
|
Grant Willcox
|
2eb31cf765
|
Add in edits from review
|
2022-05-13 15:32:12 -05:00 |
|
Jake Baines
|
da133a34c8
|
Updated affected
|
2022-05-12 03:22:02 -07:00 |
|
Jake Baines
|
617b4ae044
|
Initial commit of Zyxel unauth command injection (CVE=2022-30525)
|
2022-05-12 01:43:59 -07:00 |
|
Grant Willcox
|
6354d7a055
|
Redo explanation of exploit in documentation to appropriately account for various nuances. Also update exploit title and description accordingly.
|
2022-05-11 16:43:36 -05:00 |
|
Heyder Andrade
|
8a6dd7152e
|
Added tested versions reference
|
2022-05-11 16:43:12 -05:00 |
|
Heyder Andrade
|
77f60eb21e
|
Added module and documentation for f5 icontrol RCE (CVE-2022-1388)
|
2022-05-11 16:43:00 -05:00 |
|
William Vu
|
6532365dc8
|
Deregister VHOST
|
2022-05-03 11:52:50 -05:00 |
|
William Vu
|
8c0cd40a19
|
Fix VMware Workspace ONE Access CVE-2022-22954
|
2022-05-03 10:39:58 -05:00 |
|
William Vu
|
4ea72bb7a7
|
Add log IOC
|
2022-05-03 02:38:29 -05:00 |
|
William Vu
|
184b1b1e76
|
Add module doc
|
2022-05-02 20:41:01 -05:00 |
|
bwatters
|
ecaf8b1ba9
|
Land #16204, Hikvision Unauthenticated RCE (CVE-2021-36260)
Merge branch 'land-16204' into upstream-master
|
2022-02-25 16:37:08 -06:00 |
|
Grant Willcox
|
217afa0f3b
|
Land #16190, Axis Camera App RCE (No CVE)
|
2022-02-25 11:35:03 -06:00 |
|
Jake Baines
|
d055a7d811
|
Altered some randomization, the json extracted by check, and fixed some wording
|
2022-02-24 18:48:21 -08:00 |
|
Jake Baines
|
e1616a520f
|
Fixed a couple of typos. Changed a CheckCode. Randomized the replaced tmp file name
|
2022-02-24 06:38:36 -08:00 |
|
Jake Baines
|
4cd3563bc7
|
Initial commit of exploit for CVE-2021-36260
|
2022-02-19 13:13:24 -08:00 |
|
Jake Baines
|
5ac3330802
|
Initial commit of Axis camera app install exploit
|
2022-02-14 17:54:18 -08:00 |
|
space-r7
|
db00991f26
|
Land #16150, add nagios xi web shell upload
|
2022-02-11 11:45:06 -06:00 |
|
Jake Baines
|
0a78dd78ec
|
Used suggested method for defining user webshell, used suggested depth configuration, and used vars_get in a couple of places
|
2022-02-08 18:20:03 -08:00 |
|
space-r7
|
bed067dda0
|
Land #16125, add ARCH_CMD for GXV3140 support
|
2022-02-08 12:24:42 -06:00 |
|
Jake Baines
|
0fcc7e7733
|
Fixed spelling errors in descriptions
|
2022-02-06 02:55:17 -08:00 |
|
Jake Baines
|
9758251278
|
Initial commit of CVE-2021-37343
|
2022-02-05 18:21:18 -08:00 |
|
space-r7
|
837fdf7c5e
|
Land #16128, add cisco rv unauth rce
|
2022-02-01 10:34:57 -06:00 |
|
Jake Baines
|
78312fb300
|
Update documentation/modules/exploit/linux/http/cisco_rv_series_authbypass_and_rce.md
Co-authored-by: Shelby Pace <40177151+space-r7@users.noreply.github.com>
|
2022-02-01 06:41:26 -05:00 |
|
Jake Baines
|
ccedcfefab
|
Added exploit for CVE-2021-1472/CVE-2021-1473
|
2022-01-29 18:56:53 -08:00 |
|
Brendan Coles
|
feebf25ad4
|
Add support for GXV3140 models and ARCH_CMD busybox telnetd payload
|
2022-01-29 19:38:57 +00:00 |
|
Brendan Coles
|
a4fcddca8e
|
Rename to grandstream_gxv31xx_settimezone_unauth_cmd_exec
|
2022-01-29 19:24:09 +00:00 |
|
Grant Willcox
|
44f040ad78
|
Land #16056, Exploit Module for Grandstream UCM62xx IP PBX (CVE-2020-5722)
|
2022-01-24 21:03:46 -06:00 |
|
Grant Willcox
|
15751a0f78
|
Minor langauge fix and final typo
|
2022-01-24 21:01:34 -06:00 |
|
Jake Baines
|
2c989ec714
|
Addressed multiple review comments (spelling, doc details, randomization, etc)
|
2022-01-22 14:09:58 -08:00 |
|
Grant Willcox
|
8bb3e39fd7
|
Land #16036, Add Grandstream GXV3175 'settimezone' Unauthenticated Command Execution
|
2022-01-19 10:58:42 -06:00 |
|
Brendan Coles
|
ee2feb1207
|
Add Grandstream GXV3175 'settimezone' Unauthenticated Command Execution
|
2022-01-19 00:04:15 +00:00 |
|
Jake Baines
|
4ebb702405
|
Added an exploit for Grandstream UCM62xx IP PBX (CVE-2020-5722)
|
2022-01-15 12:46:56 -08:00 |
|
Jake Baines
|
d4ee9a0183
|
Initial commit of CVE-2021-20039 exploit
|
2022-01-10 12:43:50 -08:00 |
|
William Vu
|
2a36287d9d
|
Add more words to module doc
|
2021-10-27 19:31:03 -05:00 |
|
William Vu
|
76aa872ff5
|
Add (empty) Options header to module doc
For consistency.
|
2021-10-27 19:31:03 -05:00 |
|
William Vu
|
7bbf0305c0
|
Fix elapsed time calculation using monotonic clock
Hat tip @adfoster-r7.
|
2021-10-27 19:31:03 -05:00 |
|
William Vu
|
365365bfb0
|
Add module doc
|
2021-10-27 19:31:03 -05:00 |
|
William Vu
|
42ed1b6eef
|
Add Windows support to CVE-2021-26084 exploit
|
2021-10-14 16:58:04 -05:00 |
|
William Vu
|
78ba617aef
|
Add module doc
|
2021-10-06 16:43:57 -05:00 |
|