5e31a32771
../exec_shellcode.rb Rank = Great This exploit is missing autodetection and version checks, but should be ranked Great due to high number of possible targets ../cfme_manageiq_evm_upload_exec.rb Rank = Great This exploit implements a check to assess target availability, and the vulnerability does not require any user action ../dlink_dcs_930l_authenticated_remote_command_execution Rank = Excellent Exploit utilizes command injection ../efw_chpasswd_exec Rank = Excellent Exploit utilizes command injection ../foreman_openstack_satellite_code_exec Rank = Excellent Exploit utilizes code injection ../nginx_chunked_size Rank = Great Exploit has explicit targets with nginx version auto-detection ../tp_link_sc2020n_authenticated_telnet_injection Rank = Excellent See dlink_dcs_930l_authenticated_remote_command_execution, exploit uses OS Command Injection ../hp_smhstart Rank = Average Must be specific user to exploit, no autodetection, specific versions only |
||
---|---|---|
.. | ||
bpf_priv_esc.rb | ||
cron_persistence.rb | ||
desktop_privilege_escalation.rb | ||
docker_daemon_privilege_escalation.rb | ||
hp_smhstart.rb | ||
kloxo_lxsuexec.rb | ||
netfilter_priv_esc_ipv4.rb | ||
overlayfs_priv_esc.rb | ||
pkexec.rb | ||
recvmmsg_priv_esc.rb | ||
service_persistence.rb | ||
sock_sendpage.rb | ||
sophos_wpa_clear_keys.rb | ||
udev_netlink.rb | ||
vmware_mount.rb | ||
zpanel_zsudo.rb |