Commit Graph

610 Commits (bcb73486489095fc725c6e710b7cd0cfe4c8a3e5)

Author SHA1 Message Date
Christian Mehlmauer 14fa41a376
merge changes 2018-08-29 06:09:40 +02:00
Ben Schmeckpeper ed60b767a7
Correct claymore_dos.py's CVE reference
The CVE reference shouldn't include the `CVE-` prefix
2018-08-28 13:34:02 -05:00
Christian Mehlmauer 7431ae401b
fix more errors 2018-08-28 13:49:31 +02:00
Christian Mehlmauer a66556b436
fix msftidy errors 2018-08-28 13:12:43 +02:00
William Vu 5096eee2ec
Land #10120, npm "marked" ReDoS module 2018-08-16 15:01:12 -05:00
William Vu 3c1befdacb Clean up module 2018-08-16 15:00:56 -05:00
Brent Cook 919da41aab
Land #9692, Add DoS module for Siemens Siprotec 4 2018-08-04 07:20:57 -05:00
asoto-r7 1a3a4ef5e4
Revised 88 aux and exploit modules to add CVEs / references 2018-07-12 17:34:52 -05:00
Nicholas Starke 936632f180 Minor Tweaks to Module
This commit changes some logic around
on a few different conditional portions
of code.
2018-06-14 10:06:42 -05:00
Dhiraj Mishra c0a5a65e0c
Updated
Suggestion's by acammack-r7
2018-06-14 11:25:00 +05:30
Dhiraj Mishra b44265fcb2
Minor tweaks
Suggestion's made by bcoles
2018-06-11 13:25:02 +05:30
Dhiraj Mishra 51823b1d3d
Spaces at EOL 2018-06-09 15:58:11 +05:30
Dhiraj Mishra d3a18b2ce9
Some tweak
Thanks bcloes 😎
2018-06-09 12:15:21 +05:30
Dhiraj Mishra 76588aed09
Error at disclosure date format 2018-06-09 12:03:41 +05:30
Dhiraj Mishra f1d29e730f
Spaces at EOL 2018-06-09 11:53:21 +05:30
Dhiraj Mishra 6e8412fa73
CVE-2018-11646 - Webkit+ 2018-06-09 11:43:47 +05:30
Nicholas Starke 53d9dc75d8 Adding npm component "marked" ReDoS module
This commit adds a module for the npm component
"marked" which exploits a Regular Expression
Denial of Service (ReDoS) vulnerability in the
"heading" regular expression.  Also included
is the documentation markdown for this module.
2018-05-31 13:33:09 -05:00
Aaron Soto c8b2fc8a35
Land #9701, Flexense HTTP Server DoS exploit 2018-05-29 16:19:59 -05:00
Aaron Soto 026b22d061
Refined packet sizes and counts, improved error messages 2018-05-29 16:09:27 -05:00
Ege Balcı 3ab7526786
Name & description Change
Exploit::CheckCode changed to Unknown as suggested.
2018-05-25 20:22:51 +03:00
Adam Cammack 5ece14b064
Convert SMBLoris to an external module 2018-03-23 14:55:18 -05:00
Can 28d890147b
msftidy update and style changes 2018-03-13 09:30:48 +01:00
Can 1c7f1c79af
Updated style 2018-03-13 09:26:34 +01:00
Ege Balcı 2950c84660
Better code.
Added check function.
Smaller & cleaner code.
2018-03-12 20:33:46 +03:00
Ege Balcı 420905137b
CVA added. 2018-03-12 08:42:28 +03:00
Ege Balcı d71b6bdf0d
Update syncbreeze_enterprise_dos.rb
msftidy.rb adjustment.
2018-03-11 23:27:46 +03:00
Ege Balcı 0e4e260a02
Adding Sync Breeze Enterprise 10.6.24 DOS
This module triggers a Denial of Service vulnerability in the Sync Breeze Enterprise HTTP server. Vulnerable version of the product can be downloaded here (http://www.syncbreeze.com/setups/syncbreezeent_setup_v10.6.24.exe). After installing the software web server should be enabled via Options->Server->Enable web server on port. Module triggers a user space write access violation on syncbrs.exe memory region. Number of requests that will crash the server changes between 200-1000 depending on the OS version and system memory.
2018-03-11 23:07:50 +03:00
Can 72160598a7
msftidy fix
msftidy fix
2018-03-08 20:46:30 +01:00
Can 26f023e071
updates for passing msftidy
updates for passing msftidy
2018-03-08 20:34:49 +01:00
Can c1dc603f0d
fixed EOLs, updated license comment
fixed EOLs, updated license comment
2018-03-08 19:53:18 +01:00
Can 9c4ff479cf
module title changed 2018-03-08 15:23:02 +01:00
Can 0503a8d3e1
init siemens_siprotec4
init siemens_siprotec4
2018-03-08 14:09:53 +01:00
Adam Cammack 9a8f1ace2d
Add slowloris support for IPv6 and hostnames
Replace manual socket creation with `socket.create_connection` to get
auto-detection goodness.
2018-03-07 17:06:04 -06:00
Brent Cook ac7fe99a2b specify a python encoding for the module 2018-02-16 16:17:52 -06:00
青鸟 0abee0303f
add change 2018-02-07 03:48:36 +08:00
bluebird 278e9a92fc add module and documentation 2018-02-06 20:30:34 +08:00
h00die 62573731fe remove empty line 2018-01-24 20:54:21 -05:00
h00die 4be0e7f9ef final fixes for brother debut dos 2018-01-24 20:53:08 -05:00
h00die fb75cd4617 it does work! 2018-01-04 14:44:43 -05:00
h00die e23e87b444 bcoles fixes 2018-01-02 20:23:24 -05:00
h00die bc0a08ef5a a few updates per bcoles 2017-12-30 11:23:58 -05:00
h00die 67c2119736 oh brother 2017-12-29 14:16:34 -05:00
Brent Cook a8b845fff9
Land #9283, Add node.js ws websocket library DoS module 2017-12-20 14:20:42 -06:00
Nicholas Starke dd5532c5de Addressing Formatting Issues
There were several formatting and layout issues
that are fixed in this commit.  Also changing
`RHOSTS` to `RHOST`.
2017-12-13 14:26:27 -06:00
Nicholas Starke 2d23054a1f Changes as per comments
A few things were changed as per the PR comments:
1) The module title was reworded
2) The module description was multi-lined
3) Negative logic was rewritten to use 'unless'
4) Strings which did not require interpolation were rewritten
5) Documentation markdown was added.
2017-12-11 14:11:40 -06:00
Ryan Knell c5f218c84c Addressing comments
1. Updated documentation
2. Made the Sec-WebSocket-Key header a random value
2017-12-11 11:49:31 -05:00
Nicholas Starke 306c5d20d9 Adding ua_parser_js ReDoS Module
"ua-parser-js" is an npm module for parsing browser
user-agent strings.  Vulnerable version of this module
have a problematic regular expression that can be exploited
to cause the entire application processing thread to "pause"
as it tries to apply the regular expression to the input.
This is problematic for single-threaded application environments
such as nodejs.  The end result is a denial of service
condition for vulnerable applications, where no further
requests can be processed.
2017-12-07 10:25:29 -06:00
Ryan Knell c992837f0d Adding ws DoS module
This module verifies if ws is vulnerable
to DoS by sending a request to the server
containing a specific header value.
ws is a npm module which handles websockets.
2017-12-07 10:45:57 -05:00
Matthew Kienow 785e5944d6
Enhanced slowloris HTTP headers and minor cleanup 2017-11-21 18:19:20 -05:00
Matthew Kienow b6c81e6da0
Reimplement slowloris as external module 2017-11-21 16:21:01 -05:00