Commit Graph

53 Commits

Author SHA1 Message Date
h00die d13bccca05 peer review 2024-11-28 20:24:25 -05:00
h00die 4ebc6f1ff1 peer review 2024-11-11 17:37:33 -05:00
h00die 0de93eedb7 asterisk ami auth rce 2024-11-04 16:27:58 -05:00
h00die 9cba5dad59 WIP for asterisk rce 2024-11-01 16:28:45 -04:00
sfewer-r7 25ef7d1272 add the RCE exploit 2023-11-06 17:12:40 +00:00
h00die 557a15a115 spelling fixes on docs 2023-10-10 14:46:18 -04:00
sfewer-r7 27f5a789c9 rework the exploit to use the new MIPS64 fetch payload adapters. Removed the seperate command and dropper targets in favor of a single default target which can do both thanks to fetch payloads. Removed the redundant IO select() call which was bad copy pasta on my part. 2023-06-09 09:47:57 +01:00
sfewer-r7 6b101b5a4d make rubocop happy 2023-05-22 18:03:58 +01:00
Ron Bowes 6119330e29 Update documentation to match current version of modules 2023-04-11 09:48:53 -07:00
Ron Bowes c22c2904c2 Fix msftidy_docs stuff 2023-04-05 10:53:58 -07:00
Ron Bowes 41fe44ef1a Merge branch 'master' into unirpc-auth-bypass 2023-03-29 08:03:05 -07:00
Ron Bowes 6897be4b01 Add two Metasploit modules for UniData vulnerabilities 2023-03-29 08:01:50 -07:00
Jack Heysel 1f2a889d0c Land #17388, Zyxel router RCE
This module adds a new exploit module for a buffer
overflow in roughly 45 different Zyxel router and VPN models.
2023-03-21 15:07:04 -04:00
Jack Heysel 31a32ccd9b linting and srvhost check fix 2023-03-17 14:39:02 -04:00
jheysel-r7 764abaf087 Update documentation/modules/exploit/linux/misc/zyxel_multiple_devices_zhttp_lan_rce.md
Co-authored-by: Christophe De La Fuente <56716719+cdelafuente-r7@users.noreply.github.com>
2023-03-17 12:59:48 -04:00
Grant Willcox 6043d0ffba Update all links from Wiki site to new docs site. 2023-01-27 09:58:53 -06:00
Steffen Robertz cc5c405941 Unauthenticated RCE for multiple Zyxel Router changes 2022-12-15 21:44:57 +01:00
Steffen Robertz 1b690283db Unauthenticated RCE for multiple Zyxel Router 2022-12-15 11:50:48 +01:00
Grant Willcox 68fdb103fe Add in final touch ups to documentation to fix a typo or two for formatting. Also update exploit ranking since this exploit doesn't retrieve version information before exploiting and is not 100% reliable so Excellent ranking isn't appropriate 2022-05-11 09:39:47 -05:00
Pedro Ribeiro e0c8108942 add docs for sslvpn module 2022-03-06 23:15:53 +00:00
Grant Willcox 725c5f8d8c Add in another scenario into documentation and add additional detail to one setup step 2021-11-18 17:01:25 -06:00
Grant Willcox a915c3ce5c Add fixes for some of the issues raised during the review process on both the documentation and module side of things 2021-11-17 17:25:50 -06:00
Spencer McIntyre 0b3f95abca Writeup the module docs and move the protocol code 2021-11-12 15:15:51 -05:00
Spencer McIntyre 21c45b3733 Update module metadata 2021-10-27 11:58:53 -04:00
Spencer McIntyre 60b17b5c6f Add the module docs for OMIGOD 2021-10-26 12:08:48 -04:00
Shelby Pace a59eebc937 remove systemd limit modification info 2021-04-30 15:44:22 -05:00
Shelby Pace de22236902 add AutoCheck and update docs output 2021-04-30 15:38:57 -05:00
Rob V 7854981730 breaking up lines in documentation 2021-03-25 16:40:16 -04:00
Rob V 748ff19ef4 attempt to please linting 2021-03-25 16:11:43 -04:00
Rob V 3d32b48148 adding documentation 2021-03-25 14:39:00 -04:00
Brendan Coles 6cdb484d7c Add Aerospike Database UDF Lua Code Execution exploit 2020-12-05 14:15:22 +00:00
Pedro Ribeiro a99ce581dd Update TP-Link AC1750 Pwn2Own 2019 module 2020-11-26 12:56:02 +00:00
Spencer McIntyre a27bf9df38 Fix some grammatical mistakes and set a default target for anydesk 2020-07-01 15:27:33 -04:00
Spencer McIntyre f1c4cecf6d Add module docs for CVE-2020-13160 2020-06-17 11:30:41 -04:00
William Vu f60e569c1b Add Cisco CML and VIRL-PE advisory to Salt modules
Hat tip @brudis-r7!
2020-05-29 15:24:00 -05:00
William Vu 06f9099d7f Add BASE_DN and ROOT_KEY to vmdir and Salt modules 2020-05-22 11:16:58 -05:00
William Vu d431cd9a6b Actually write the setup guide in the module docs
Oops. This should have been filled out.
2020-05-12 12:27:19 -05:00
William Vu f85a8c2e79 Add module docs 2020-05-11 12:05:38 -05:00
Radek Domanski 5f8d1ef4fd Adding documentation for tplink_archer_a7_c7_lan 2020-04-07 19:58:22 +02:00
h00die 9f29f5f419 fix spelling received 2019-10-05 14:40:27 -04:00
Matthew Kienow ecc6c473d8 Add note about unauthenticated telnetd service 2018-08-23 15:50:41 -04:00
Matthew Kienow ee6bf7a77c Fix documentation markdown table format 2018-08-23 15:23:41 -04:00
Matthew Kienow 18712c25cd Add uname to module documentation scenario 2018-08-23 15:23:41 -04:00
Matthew Kienow 77b77287cc Add module and payload documentation 2018-08-23 15:23:40 -04:00
Brendan Coles 2c0c99e980 Add documentation 2018-06-03 05:41:53 +00:00
William Vu 436e414b93 Land #7815, CVE-2016-9299 exploit 2018-05-16 05:29:41 -05:00
Brendan Coles 8168e881b3 Add documentation 2018-02-07 07:49:21 +00:00
caleBot e8de6a46d5 Update ueb9_bpserverd.md 2017-10-20 12:21:17 -06:00
caleBot 36610b185b initial commit for UEB9 exploits - CVE-2017-12477, CVE-2017-12478 2017-10-06 09:38:33 -06:00
Brendan Coles 60f7534969 Add documentation 2017-08-15 03:43:22 +00:00