Commit Graph

11311 Commits

Author SHA1 Message Date
Pedro Ribeiro f1663afd53 Change patch level of vulnerable versions 2018-05-30 00:37:29 +03:00
Pedro Ribeiro 476030bbd6 Fix grep with proper Base64 support; IBM bug! 2018-05-29 18:49:52 +03:00
Pedro Ribeiro a3c7ac830f Fix typo in rand 2018-05-29 18:40:50 +03:00
Pedro Ribeiro ac5718d24c Fix whitespace 2018-05-29 15:02:36 +03:00
Pedro Ribeiro 809982b430 Make changes requested by bcoles 2018-05-29 14:48:57 +03:00
Pedro Ribeiro 56dd07639f add vuln versions 2018-05-28 17:37:58 +03:00
Pedro Ribeiro aaaa9c7508 Fix warnings from travis 2018-05-28 17:18:52 +03:00
Pedro Ribeiro e126681814 Changed disclosure date 2018-05-28 17:08:48 +03:00
Pedro Ribeiro cfb7d4c2fe Add github url 2018-05-28 16:53:54 +03:00
Pedro Ribeiro 7db8183bc7 Create file for CVE-2018-1418 2018-05-28 16:39:10 +03:00
Brent Cook fad5a99c7d fix incorrect disclosure date 2018-05-25 02:59:08 -05:00
Brent Cook bc5c7a15e5 remove single-entry OptEnum from module, since there is only one possible TECHNIQUE 2018-05-23 13:44:53 -05:00
Brendan Coles 15e472637a Land #10070, Fix cleanup in exploits/osx/local/rootpipe_entitlements 2018-05-22 21:52:24 +00:00
bwatters-r7 40d5f46277 Lad #10017, D-Link DSL-2750B Unauthenticated OS Command Injection
Merge branch 'land-10017' into upstream-master
2018-05-22 10:54:33 -05:00
lucyoa 6cc1a8dcbd Rubocop fixes 2018-05-22 10:34:05 -04:00
Tim W 88ab836e15 Land #9987, AF_PACKET chocobo_root exploit 2018-05-21 17:05:53 +08:00
Tim W 9e9dff8b6a fix file cleanup on failed exploitation 2018-05-21 16:47:09 +08:00
Tim W cd0161ada2 fix gcc for shell_reverse_tcp payloads on ubuntu 2018-05-21 16:46:42 +08:00
lucyoa 6ae55aadd4 Fixing documentation, improving exploits code 2018-05-20 12:55:46 -04:00
Brendan Coles aa033bf5c1 Fix cleanup 2018-05-20 16:19:25 +00:00
bwatters-r7 294b263159 Land #9966, Add Reliable Datagram Sockets (RDS) Privilege Escalation exploit
Merge branch 'land-9966' into upstream-master
2018-05-18 17:06:04 -05:00
Brent Cook 37f1e44a12 Land #10009, Add initial check support to external modules 2018-05-18 09:31:31 -05:00
Brendan Coles eb3733ffb4 unless 2018-05-17 17:42:55 +00:00
Tim W 6594cbb5cc Land #9947, AF_PACKET packet_set_ring exploit 2018-05-17 18:43:52 +08:00
Tim W dc227153c4 fix gcc on shell_reverse_tcp session 2018-05-17 18:43:27 +08:00
Tim W ce5b24eda0 fork early and cleanup files in module 2018-05-17 00:32:01 +08:00
William Vu 739d58135f Move EXE generation in struts_code_exec_parameters 2018-05-16 06:15:40 -05:00
William Vu 6ec0272ff5 Land #8727, CVE-2017-9791 exploit 2018-05-16 05:41:26 -05:00
William Vu eaec1d7486 Clean up module 2018-05-16 05:39:17 -05:00
William Vu 436e414b93 Land #7815, CVE-2016-9299 exploit 2018-05-16 05:29:41 -05:00
William Vu 959cbde6eb Clean up module 2018-05-16 05:29:25 -05:00
Brendan Coles c5f980f633 GoodRanking 2018-05-16 02:38:19 +00:00
zerosum0x0 4a64401a58 fix ms17-010 similar to 4a56ecf3ae 2018-05-14 15:45:20 -06:00
Aaron Soto f5a43f2ed0 Land #9991, Remove need for temp file with xdebug_unauth_exec 2018-05-14 08:55:38 -05:00
lucyoa 8dd7a27f7b Fixes according to code review 2018-05-14 05:46:23 -04:00
lucyoa f65361258b Adding vulnerable firmwares to description 2018-05-13 15:08:32 -04:00
lucyoa 382364a3ff Adding documentation, improving description 2018-05-13 15:04:40 -04:00
lucyoa c3ad02121c Exploit for D-Link DSL2750B OS Command Injection vulnerability 2018-05-13 13:58:35 -04:00
Tim W ed5f2bffa9 Land #9919, add libuser roothelper privilege escalation exploit 2018-05-12 17:11:21 +08:00
Tim W a8660e4042 make the PASSWORD option required 2018-05-12 17:10:21 +08:00
Adam Cammack b0e712e992 Add banner check exploit/linux/smtp/haraka 2018-05-11 12:45:32 -05:00
Adam Cammack 90f2fe545c Add PEP8 whitespace to exploit/linux/smtp/haraka 2018-05-11 12:43:30 -05:00
Jacob Robles 9811de430c Land #9878, Add MSF module for EDB 6768, Mantis <= v1.1.3 Post-auth RCE 2018-05-09 11:55:22 -05:00
Jacob Robles a1fed72423 store credential, use vprints 2018-05-09 11:50:07 -05:00
miluxsec 5ed1bde65f Removed unused FileDropper include 2018-05-08 18:10:29 +02:00
miluxsec 5038098efb Remove need for writable directory when using xdebug exploit
By base64 encoding the exploit code and decoding it on the target the
need for writing a temporary file is removed.
See #9918
2018-05-07 22:11:21 +02:00
William Vu 0240c3f010 Land #9980, PAN-OS readSessionVarsFromFile exploit 2018-05-07 14:55:00 -05:00
Jacob Robles a18459a14c Fix indentation, documentation update 2018-05-07 09:22:21 -05:00
Touhid M Shaikh 235cac621f playsms_CVE-2017-9101
playsms_CVE-2017-9101
2018-05-07 18:55:22 +05:30
Touhid M Shaikh 74793efdef Delete playsms_uploadcsv_exec.rb 2018-05-07 18:54:35 +05:30