metasploit-framework/modules/exploits/linux/local
Bryan Chu 5e31a32771 Add missing ranks
../exec_shellcode.rb
Rank = Great
This exploit is missing autodetection and version checks,
but should be ranked Great due to high number of possible targets

../cfme_manageiq_evm_upload_exec.rb
Rank = Great
This exploit implements a check to assess target availability,
and the vulnerability does not require any user action

../dlink_dcs_930l_authenticated_remote_command_execution
Rank = Excellent
Exploit utilizes command injection

../efw_chpasswd_exec
Rank = Excellent
Exploit utilizes command injection

../foreman_openstack_satellite_code_exec
Rank = Excellent
Exploit utilizes code injection

../nginx_chunked_size
Rank = Great
Exploit has explicit targets with nginx version auto-detection

../tp_link_sc2020n_authenticated_telnet_injection
Rank = Excellent
See dlink_dcs_930l_authenticated_remote_command_execution,
exploit uses OS Command Injection

../hp_smhstart
Rank = Average
Must be specific user to exploit, no autodetection,
specific versions only
2017-03-31 02:39:44 -04:00
..
bpf_priv_esc.rb update architecture 2016-11-20 19:09:33 -06:00
cron_persistence.rb fixes round 2 2016-07-15 08:44:39 -04:00
desktop_privilege_escalation.rb Implement first pass of architecture/platform refactor 2016-10-28 07:16:05 +10:00
docker_daemon_privilege_escalation.rb Implement first pass of architecture/platform refactor 2016-10-28 07:16:05 +10:00
hp_smhstart.rb Add missing ranks 2017-03-31 02:39:44 -04:00
kloxo_lxsuexec.rb Add missing rank 2016-09-28 16:37:04 -05:00
netfilter_priv_esc_ipv4.rb renaming per @bwatters-r7 comment in #7491 2016-11-18 13:52:09 -05:00
overlayfs_priv_esc.rb update architecture 2016-11-20 19:09:33 -06:00
pkexec.rb Merge remote-tracking branch 'upstream/master' into land-7507-uuid-arch 2016-11-20 19:08:56 -06:00
recvmmsg_priv_esc.rb Implement first pass of architecture/platform refactor 2016-10-28 07:16:05 +10:00
service_persistence.rb updates round 2 2016-07-15 09:02:23 -04:00
sock_sendpage.rb Remove commented x64 arch from sock_sendpage 2016-11-01 01:29:11 +10:00
sophos_wpa_clear_keys.rb use MetasploitModule as a class name 2016-03-08 14:02:44 +01:00
udev_netlink.rb Implement first pass of architecture/platform refactor 2016-10-28 07:16:05 +10:00
vmware_mount.rb use MetasploitModule as a class name 2016-03-08 14:02:44 +01:00
zpanel_zsudo.rb use MetasploitModule as a class name 2016-03-08 14:02:44 +01:00