Commit Graph

57808 Commits

Author SHA1 Message Date
debifrank ae065530f1
Delete CVE-2020-16138.py 2020-08-14 12:47:55 -04:00
debifrank 7e6ef0d713
Update CVE-2020-16138.md 2020-08-14 12:46:37 -04:00
debifrank e001839dcb
Update CVE-2020-16138.md 2020-08-14 12:45:38 -04:00
debifrank 7d125c9741
Add files via upload 2020-08-14 12:16:52 -04:00
debifrank ffa23ba850
Delete CVE-2020-16139.py 2020-08-14 12:16:22 -04:00
debifrank 0e0bdc4f98
Update CVE-2020-16139.md 2020-08-14 12:15:53 -04:00
Metasploit 2e887a8d95
automatic module_metadata_base.json update 2020-08-14 10:17:06 -05:00
gwillcox-r7 87dc75b5ee
Land #13997, Update VBulletin module with correct CVE 2020-08-14 10:05:58 -05:00
debifrank b4689dfa2d
Update CVE-2020-16139.md
WIP
2020-08-14 10:12:39 -04:00
Tod Beardsley f401f48138
Update vbulletin module with correct CVE
Apparently someone snarfed the CVE for this out from under me. Since they were faster
to publish, we should use that number instead of the one out of our block.
2020-08-14 08:25:57 -05:00
dwelch-r7 a47e4d42b5 Code review comments 2020-08-14 12:28:38 +01:00
h00die 82c25ebd88 add docs to safari jit 2020-08-14 14:14:08 +07:00
Michael-ZecOps 5877c79538
Force stack alignment 2020-08-14 01:16:20 +03:00
gwillcox-r7 0dc53c46d4
Apply Rubocop fixes I forgot about and update the module description to add in missing information about affected parameters 2020-08-13 15:23:09 -05:00
gwillcox-r7 c59b3835f9
Fix up module description to have better sentence structure and English and to also include the actual versions of the products that were affected in addition to the firmware versions. This prevents people from having to read the documentation to find affected targets 2020-08-13 15:18:10 -05:00
gwillcox-r7 dc21773f10
Apply updates to make the English a bit neater r.e affected versions. Also applied updates to make the markdown have bullet points so it displays better. Finally modified up the module description to explain the actual issue a bit more, but it might still need work 2020-08-13 15:13:55 -05:00
gwillcox-r7 3c70f37dbe
Update exploit ranking to reflect the fact that this is a CMD Injection vulnerability with no chance of crashing the host 2020-08-13 14:40:33 -05:00
ddouhine 959689d5de
Update geutebruck_testaction_exec.rb
Fixed rubocop offenses / msftidy warnings and added @bcoles enhancements.
2020-08-13 14:29:31 -05:00
ddouhine 5f6a0746a6
Update modules/exploits/linux/http/geutebruck_testaction_exec.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-08-13 14:29:30 -05:00
ddouhine a69d941a72
Update modules/exploits/linux/http/geutebruck_testaction_exec.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-08-13 14:29:30 -05:00
ddouhine 4ceb542fac
Update modules/exploits/linux/http/geutebruck_testaction_exec.rb
Co-authored-by: bcoles <bcoles@gmail.com>
2020-08-13 14:29:30 -05:00
ddouhine 42a2a77a7e
Update geutebruck_testaction_exec.md
or now... (forgot the msftidy_docs just before)
2020-08-13 14:29:29 -05:00
ddouhine e4f760691e
Update geutebruck_testaction_exec.md
it should be better now :)
2020-08-13 14:29:29 -05:00
ddouhine a14a2fe8d2
Add documentation for Geutebruck G-CAM exploit 2020-08-13 14:29:28 -05:00
ddouhine a5e25f5a42
Add exploit for Geutebruck G-CAM 2020-08-13 14:29:28 -05:00
gwillcox-r7 c79f293e52
Land #13846, Add support for import Nmap vulners script output 2020-08-13 12:21:31 -05:00
Metasploit eb64d47b31
Bump version of framework to 6.0.2 2020-08-13 12:04:11 -05:00
h00die 55d1efc18b missed one 2020-08-13 10:45:55 -04:00
h00die c9f39def13 review comment 2020-08-13 10:44:57 -04:00
debifrank 1e244ddaec
Add files via upload
Linted with msftidy_docs.rb
2020-08-13 09:57:17 -04:00
debifrank 8fe7417d1b
Delete CVE-2020-16137.md
Linting
2020-08-13 09:56:58 -04:00
debifrank b461f4ede8
Add files via upload
Linted with msftidy_docs.rb
2020-08-13 09:56:30 -04:00
debifrank 45ef9f9324
Delete CVE-2020-16138.md
Linting
2020-08-13 09:56:08 -04:00
debifrank 27d889a599
Add files via upload
Linted with msftidy_docs.rb
2020-08-13 09:55:37 -04:00
debifrank f6581b9518
Delete CVE-2020-16139.md
Linting
2020-08-13 09:55:14 -04:00
debifrank d1afe60262
Add files via upload
Linted with autopep8
2020-08-13 09:52:21 -04:00
debifrank dada2abaad
Delete CVE-2020-16139.py
Linting
2020-08-13 09:52:04 -04:00
debifrank a21907fcc6
Add files via upload
Linted with autopep8
2020-08-13 09:51:24 -04:00
Niboucha Redouane 1a468fa210 remove unneeded include, left from an attempt to execute native payloads 2020-08-13 15:51:09 +02:00
debifrank 4434e37a09
Delete CVE-2020-16138.py
linting
2020-08-13 09:51:03 -04:00
debifrank 0a025123e9
Add files via upload
Linted with autopep8
2020-08-13 09:50:33 -04:00
debifrank 2a739ed5eb
Delete CVE-2020-16137.py
Linting
2020-08-13 09:50:09 -04:00
Niboucha Redouane 3df276230a write whole FTP link, looks like some browsers dropped FTP support, and markdown does not render it as a link 2020-08-13 15:19:33 +02:00
Niboucha Redouane 66d3b1cd59 Add exploit for CVE-2019-13372 2020-08-13 15:07:11 +02:00
h00die 16c95c4e85 teamviewer exploit 2020-08-12 19:59:00 -04:00
gwillcox-r7 2305da2638
Land #13969, Fix stall due to bad logic within scanner.rb 2020-08-12 16:57:01 -05:00
gwillcox-r7 9f17dda98c
Land #13988, Ignore tests/specs when reloading files 2020-08-12 14:18:59 -05:00
Metasploit 788d944e66
automatic module_metadata_base.json update 2020-08-12 13:31:02 -05:00
gwillcox-r7 bdad038e70
Land #13959, Add a login scanner for Jupyter Notebooks 2020-08-12 13:21:21 -05:00
gwillcox-r7 da39015941
Ninja commit edits to documentation to explain how to fix some setup issues that may occur 2020-08-12 13:20:31 -05:00