msutovsky-r7
|
fde78bf73f
|
Land #20324, adds exploit for UNC path in .url files (CVE-2025-33053)
Adds exploit module for Internet Shortcut UNC path vulnerability (CVE-2025-33053)
|
2025-06-25 11:23:23 +02:00 |
|
Martin Sutovsky
|
13cd2d2e51
|
Minor code changes, updates documentation
|
2025-06-24 16:22:42 +02:00 |
|
adfoster-r7
|
be8864fe84
|
Merge pull request #20339 from bcoles/exploit-windows-fileformat-ms_visual_basic_vbp
exploit/windows/fileformat/ms_visual_basic_vbp: Add offsets, cleanup, document
|
2025-06-23 10:41:14 +01:00 |
|
bcoles
|
e1dec29ef9
|
exploit/windows/browser/ms08_070_visual_studio_msmask: Cleanup and add documentation
|
2025-06-23 00:38:44 +10:00 |
|
bcoles
|
c0baf1888b
|
exploit/windows/fileformat/ms_visual_basic_vbp: Add offsets, cleanup, document
|
2025-06-23 00:11:54 +10:00 |
|
DevBuiHieu
|
ec5ba0bd0d
|
Final code for CVE-2025-33053 exploit module
|
2025-06-17 23:03:36 -04:00 |
|
DevBuiHieu
|
20b8a9fcd3
|
Add some features and fix bugs for CVE-2025-33053 exploit module
|
2025-06-17 22:59:34 -04:00 |
|
DevBuiHieu
|
20629fe6b8
|
Add some features and fix all errors for CVE-2025-33053 exploit module
|
2025-06-17 02:49:10 -04:00 |
|
DevBuiHieu
|
f81ddf82f1
|
Add some features for CVE-2025-33053 exploit module
|
2025-06-17 01:00:35 -04:00 |
|
Diego Ledda
|
ce6e0d1164
|
Merge pull request #20096 from h00die-gr3y/CVE-2025-30406
Gladinet CentreStack/Triofox ASP.NET ViewState Deserialization [CVE-2025-30406]
|
2025-05-28 13:46:13 +02:00 |
|
h4x-x0r
|
e9c88b55f2
|
cleanup
|
2025-05-09 22:39:30 +01:00 |
|
h4x-x0r
|
803581ab81
|
CVE-2024-7399
|
2025-05-09 17:27:22 +01:00 |
|
Brendan
|
5faa0a5b6b
|
Merge pull request #19777 from msutovsky-r7/linqpad_deserialization
Linqpad deserialization persistence
|
2025-05-13 08:03:30 -05:00 |
|
msutovsky-r7
|
3af76cfa00
|
Renames incorrect option in documentation
Co-authored-by: Brendan <bwatters@rapid7.com>
|
2025-05-13 06:30:00 +02:00 |
|
Martin Sutovsky
|
d16c639278
|
Adds cleanup option in documentation
|
2025-05-06 09:07:21 +02:00 |
|
Martin Sutovsky
|
24a86cd74a
|
Refactoring based on comments
|
2025-05-06 08:43:57 +02:00 |
|
h00die-gr3y
|
908094da6b
|
update documentation with privileged escalation to system
|
2025-05-02 20:59:07 +00:00 |
|
h00die-gr3y
|
1c5be6154a
|
second release including Triofox + documentation
|
2025-05-02 20:42:14 +00:00 |
|
Spencer McIntyre
|
3216fbbde3
|
Fix the smb_to_ldap module
|
2025-05-01 16:59:16 -04:00 |
|
Jack Heysel
|
3ead0fdf42
|
Add check for is_uac_enabled?
|
2025-04-16 17:59:53 -07:00 |
|
Jack Heysel
|
9a95f60df6
|
Updated service_permissions with action to exploit CVE-2025-21293
|
2025-04-16 10:55:05 -07:00 |
|
jheysel-r7
|
5505bb5ef1
|
Merge pull request #19947 from machang-r7/machang-r7-module-cve-2025-27218
Create sitecore_xp_cve_2025_27218.rb
|
2025-03-28 07:40:28 -07:00 |
|
Jack Heysel
|
fa0c29837e
|
Update author, rubocop, msftidy_docs
|
2025-03-27 09:36:10 -07:00 |
|
Jack Heysel
|
74cc1d313c
|
Add documentation
|
2025-03-27 09:28:44 -07:00 |
|
bwatters-r7
|
ec67435de9
|
Rebase and squash for CVE-2024-30085
|
2025-03-20 09:03:28 -05:00 |
|
msutovsky-r7
|
712b47b0bf
|
Merge branch 'rapid7:master' into linqpad_deserialization
|
2025-01-24 16:52:29 +01:00 |
|
h00die
|
ce9f1b9101
|
fix nsfw link
|
2025-01-09 21:23:38 -05:00 |
|
Martin Sutovsky
|
302052c692
|
LINQPad deserialization module init
|
2024-12-30 15:57:59 +01:00 |
|
Diego Ledda
|
58702f238c
|
Land #19574, Windows Access Mode Mismatch LPE in ks.sys (CVE-2024-35230)
Land #19574, Windows Access Mode Mismatch LPE in ks.sys (CVE-2024-35230)
|
2024-12-04 16:39:43 +01:00 |
|
Spencer McIntyre
|
e52edf447c
|
Implement feedback from the PR
|
2024-11-20 13:51:39 -05:00 |
|
h4x-x0r
|
37c148cc7c
|
CVE-2024-47407
CVE-2024-47407
|
2024-11-13 03:55:17 +00:00 |
|
Jack Heysel
|
81b83f2fd6
|
Updated docs and check
|
2024-11-06 09:13:51 -08:00 |
|
Jack Heysel
|
7a5bc60aab
|
Windows Access Mode Mismatch LPE in ks.sys [CVE-2024-35250]
|
2024-11-05 15:31:44 -08:00 |
|
Spencer McIntyre
|
9f41937c7a
|
Finish up the exploit module
|
2024-10-28 17:20:35 -04:00 |
|
dledda-r7
|
0bf524482c
|
Land #19345, Post module Windows LPE CVE-2024-30088
|
2024-09-17 08:13:21 -04:00 |
|
Jack Heysel
|
7bfd814297
|
Removed memory polling
|
2024-08-30 12:52:18 -07:00 |
|
adfoster-r7
|
fabb5d1f78
|
Land #19422, pgAdmin 8.4 RCE / CVE-2024-3116
|
2024-08-28 18:54:53 +01:00 |
|
adfoster-r7
|
aaf95f9134
|
Apply suggestions from code review
|
2024-08-28 18:46:08 +01:00 |
|
igomeow
|
7e9f52dd0b
|
Github release
|
2024-08-26 23:02:53 +02:00 |
|
igomeow
|
b3605bd951
|
Documentation
|
2024-08-26 19:59:17 +02:00 |
|
jheysel-r7
|
bde9fca9e4
|
Apply suggestions from code review
|
2024-08-22 02:35:21 -04:00 |
|
Jack Heysel
|
31348dac33
|
Windows LPE CVE-2024-30088
|
2024-08-21 23:16:37 -07:00 |
|
dledda-r7
|
35da4662ed
|
Land #19351, DIAEnergie SQL Injection
|
2024-08-21 09:44:15 -04:00 |
|
h4x-x0r
|
8732d7cd58
|
LG Simple Editor Command Injection (CVE-2023-40504) Module
Exploit Module and Documentation for the LG Simple Editor Command Injection (CVE-2023-40504)
|
2024-08-07 05:16:25 +01:00 |
|
h4x-x0r
|
80961b0fef
|
Merge branch 'rapid7:master' into my_awesome_branch
|
2024-08-01 22:57:36 -05:00 |
|
dledda-r7
|
48c69b99fb
|
Land #19344, FortiClient EMS FCTID SQLi to RCE fix for 7.2.x
|
2024-07-31 09:43:19 -04:00 |
|
h4x-x0r
|
2d9aed7ec3
|
fixed typo
|
2024-07-30 13:39:03 -04:00 |
|
h4x-x0r
|
cd1c100bd8
|
DIAEnergie SQL Injection (CVE-2024-4548) Module Documentation
|
2024-07-30 13:21:34 -04:00 |
|
h4x-x0r
|
14945679ba
|
Updated email generation part.
|
2024-07-25 23:54:27 -04:00 |
|
h4x-x0r
|
c8feb5c5e6
|
Updated formatting
|
2024-07-24 22:40:00 -04:00 |
|