h00die
h00die
This is a rework of #16465 and expands on the work of @npm-cesium137-io but unfortunately they seem to gone missing (mainly due to my rework taking a long time). It...
This PR adds a module which exploits several authenticated sqli in VICIdial. Of note, two of the modules require a permissions change (vicibox sets admin permissions to near nothing, other...
Fix "Manage Engine" to be "ManageEngine" in `exploit/windows/http/manageengine_adshacluster_rce` to be consistent with literally every other module. I would update the link as well to `https://security.szurek.pl/en/manage-engine-exchange-reporter-plus-unauthenticated-rce/`
https://securityboulevard.com/2022/10/new-text2shell-rce-vulnerability-in-apache-common-texts-cve-2022-42889/
The current implementation of `ssl_version` does just about nothing unfortunately. I think it was put together in haste to scan for POODLE, but time has not been kind to it....
As per discussion here: https://github.com/rapid7/metasploit-framework/pull/17067#issuecomment-1279339260 Implement an upper bounds on the exploitable versions of remote mouse and update the documentation with a vulnerable download link. ## Verification - [ ]...
https://github.com/Warxim/CVE-2022-41852
This PR adds a new exploit for the Remote Control Server software. It's another 1 off from Unified Remote/mobile mouse and wifi mouse. This is the last in the series....
## Summary https://www.vectra.ai/blogpost/undermining-microsoft-teams-security-by-mining-tokens From the article: "In August 2022, the Vectra Protect team identified a post-exploitation opportunity allowing malicious actors with sufficient local or remote file system access to steal...
# Documentation Issue Finder Generated: 2022-10-09 13:40:24 ## Modules Without Documentation + [ ] [metasploit-framework/modules/auxiliary/scanner/dect/call_scanner](https://github.com/rapid7/metasploit-framework/blob/master/modules//auxiliary/scanner/dect/call_scanner.rb) + [ ] [metasploit-framework/modules/auxiliary/scanner/dect/station_scanner](https://github.com/rapid7/metasploit-framework/blob/master/modules//auxiliary/scanner/dect/station_scanner.rb) + [ ] [metasploit-framework/modules/auxiliary/scanner/discovery/ipv6_multicast_ping](https://github.com/rapid7/metasploit-framework/blob/master/modules//auxiliary/scanner/discovery/ipv6_multicast_ping.rb) + [ ] [metasploit-framework/modules/auxiliary/scanner/discovery/ipv6_neighbor_router_advertisement](https://github.com/rapid7/metasploit-framework/blob/master/modules//auxiliary/scanner/discovery/ipv6_neighbor_router_advertisement.rb) + [ ]...