Grant Willcox
7217a60e41
Update documentation to provide better installation instructions
2023-03-14 10:13:27 -05:00
Grant Willcox
4a4b2a28d2
Update documentation to provide better installation instructions
2023-03-14 09:21:08 -05:00
Grant Willcox
3bd4c15704
Correct architecture and do final fixes
2023-03-13 15:46:42 -05:00
Jack Heysel
2a9ddae531
Updated description
2023-03-09 17:43:14 -05:00
Jack Heysel
06e7c3d702
Responded to comments updated docs
2023-03-09 17:39:53 -05:00
Grant Willcox
100cfbccf9
Fix up some more slight things in documentation. Also tidy up some things in the module
2023-03-08 17:25:56 -06:00
Grant Willcox
eeb30d2426
Fix up some typos etc from review in documentation
2023-03-08 16:44:06 -06:00
Jack Heysel
dfae7e2fc4
FortiNAC keyUploap.jsp arbitrary file write CVE-2022-39952
2023-03-08 14:06:28 -05:00
Jack Heysel
3abd62076c
Land #17624 , Oracle E-Business Suite Module
...
This pull request adds an exploit module for CVE-2022-21587
an arbitrary file upload vulnerability in Oracle Web Applications
Desktop Integrator as shipped with 12.2.3 through to 12.2.11
which results in RCE
2023-02-28 17:04:20 -05:00
Jack Heysel
5311a491e9
Froxlor 2.0.7 is actually vulnerable too
2023-02-24 13:18:34 -05:00
space-r7
9621f77bac
Land #17640 , add Froxlor RCE
2023-02-22 12:11:38 -06:00
sfewer-r7
690abcfe1f
improve the documentation, mention some steps required during setup.
2023-02-22 09:42:11 +00:00
Jack Heysel
f6ec3855b3
Removed space at EOL
2023-02-22 00:35:42 -05:00
Jack Heysel
0c8df1a67b
Updated docs and module suggetsions
2023-02-22 00:33:40 -05:00
Grant Willcox
38d8b70873
Make msftidy_docs.rb happy and then also clarify where to find software download links
2023-02-17 14:56:51 -06:00
Grant Willcox
c713da368d
Add in a few fixes from the review
2023-02-17 14:52:57 -06:00
sfewer-r7
73e82274dd
changes as per @gwillcox-r7 review
2023-02-17 13:10:53 +00:00
Spencer McIntyre
ecd5ad29a7
Add module docs
2023-02-15 16:29:42 -05:00
sfewer-r7
d1463df3cc
fix documentation issues from msftidy_docs
2023-02-14 10:47:47 +00:00
Jack Heysel
ca0b1ffe05
Documentation fixes
2023-02-13 19:56:23 -05:00
Jack Heysel
2e195b2742
Initial commit Froxlor RCE
2023-02-13 19:39:18 -05:00
Grant Willcox
d012145726
Land #17599 , Cisco RV LAN Exploit - CVE-2022-20705 and CVE-2022-20707
2023-02-13 17:50:06 -06:00
Grant Willcox
45e453d687
Fix up remaining review comments
2023-02-13 15:07:25 -06:00
sfewer-r7
6b29b14c46
add in module documentation
2023-02-10 12:41:55 +00:00
Grant Willcox
f2a86327d0
Minor fixes from review
2023-02-09 15:34:25 -06:00
Stephen Wildow
427c181e9a
Utilized msftidy_docs.rb to clean up missing sections, excessively long lines, spaces at EOL, and space end of file. Removed credit section. Expanded on installation procedure. Modified steps procedure to include Verify options and removed failure status. Removed Targets section. Scenarios have device, target, and architecture.
2023-02-08 19:18:14 -05:00
Jack Heysel
19bcf8be7f
Working hardcoded payload
2023-02-08 18:14:11 -05:00
Stephen Wildow
35749a000a
Added docs. Performed code linting with rubocop.
2023-02-07 20:27:07 -05:00
Matthew Dunn
52fa2e5be6
Add example for version 5.5.6 with CVE-2021-25297
2023-02-07 14:18:53 -06:00
Grant Willcox
489ab24876
Add in additional case documentation for the various targets and CVEs and fix a bug in the code
2023-02-07 14:18:45 -06:00
Matthew Dunn
8ba7a28caf
Add quotes to set-time command in docs
2023-02-07 14:18:45 -06:00
Matthew Dunn
90e07ef5ed
Switch to match over scan and add troubleshooting steps
2023-02-07 14:18:37 -06:00
Matthew Dunn
1cb06b11ac
Adjust exploit and docs to support versions 5.5.6-5.7.5
2023-02-07 14:18:09 -06:00
Matthew Dunn
87176f9d7f
Address Review Comments and add CVE-2021-25297 coverage
2023-02-07 14:18:06 -06:00
Matthew Dunn
b042e71b2a
Make Module work for both target url parameters
2023-02-07 14:18:04 -06:00
Matthew Dunn
b606d1ff6b
Add Documentation for Module
...
Fix CVE format
Add Documentation
2023-02-07 14:18:04 -06:00
adfoster-r7
6870efc34a
Land #17426 , Update all references to old Wiki to point to new docs site
2023-02-01 23:49:20 +00:00
adfoster-r7
bbf17c167c
Land #17511 , add exploit for CVE-2022-44877 command injection in CentOS Control Web Panel
2023-01-31 14:05:19 +00:00
Grant Willcox
6043d0ffba
Update all links from Wiki site to new docs site.
2023-01-27 09:58:53 -06:00
Spencer McIntyre
f81195d0cc
Fix a typo
2023-01-25 13:45:18 -05:00
space-r7
153af9fb68
Land #17407 , add Cacti unauth command injection
2023-01-23 13:06:46 -06:00
Spencer McIntyre
6fe0933c1e
Add exploit for CVE-2022-44877
2023-01-20 09:04:24 -05:00
Grant Willcox
7e23c34e6c
Apply fixes per code review
2023-01-17 12:44:22 -06:00
h00die-gr3y
da3ae22135
added documentation
2023-01-17 12:44:20 -06:00
Grant Willcox
f39973de86
Fix up missing option in documentation and also add some additional validation on server response.
2023-01-04 17:02:05 -06:00
h00die-gr3y
c7b59b4815
updates based on gwillcox-r7 review comments
2023-01-04 17:02:04 -06:00
h00die-gr3y
6801cbd21e
updated Limitation section
2023-01-04 17:02:03 -06:00
h00die-gr3y
fc6acdab6a
added documentation
2023-01-04 17:01:59 -06:00
Christophe De La Fuente
20d70799a7
Land #17298 , Add opentsdb_yrange_cmd_injection module and docs
2022-12-23 13:38:58 +01:00
ErikWynter
8f96746551
fix typo and add credit for discovery
2022-12-23 11:11:31 +02:00