@@ -17,7 +17,8 @@ class Exploit(exploits.Exploit):
...
@@ -17,7 +17,8 @@ class Exploit(exploits.Exploit):
"""
"""
__info__={
__info__={
'name':'3Com IMC Path Traversal',
'name':'3Com IMC Path Traversal',
'description':'Exploits 3Com Intelligent Management Center path traversal vulnerability. If the target is vulnerable it is possible to read file from the filesystem.',
'description':'Exploits 3Com Intelligent Management Center path traversal vulnerability. '
'If the target is vulnerable it is possible to read file from the filesystem.',
@@ -17,7 +17,8 @@ class Exploit(exploits.Exploit):
...
@@ -17,7 +17,8 @@ class Exploit(exploits.Exploit):
"""
"""
__info__={
__info__={
'name':'3Com OfficeConnect Info Disclosure',
'name':'3Com OfficeConnect Info Disclosure',
'description':'Exploits 3Com OfficeConnect information disclosure vulnerability. If the target is vulnerable it is possible to read sensitive information.',
'description':'Exploits 3Com OfficeConnect information disclosure vulnerability. '
'If the target is vulnerable it is possible to read sensitive information.',
@@ -18,7 +18,8 @@ class Exploit(exploits.Exploit):
...
@@ -18,7 +18,8 @@ class Exploit(exploits.Exploit):
"""
"""
__info__={
__info__={
'name':'Belkin G Info Disclosure',
'name':'Belkin G Info Disclosure',
'description':'Module exploits Belkin Wireless G Plus MIMO Router F5D9230-4 information disclosure vulnerability which allows fetching sensitive information such as credentials.',
'description':'Module exploits Belkin Wireless G Plus MIMO Router F5D9230-4 information disclosure '
'vulnerability which allows fetching sensitive information such as credentials.',
@@ -17,7 +17,8 @@ class Exploit(exploits.Exploit):
...
@@ -17,7 +17,8 @@ class Exploit(exploits.Exploit):
"""
"""
__info__={
__info__={
'name':'Cisco UCM Info Disclosure',
'name':'Cisco UCM Info Disclosure',
'description':'Module exploits information disclosure vulnerability in Cisco UCM devices. If the target is vulnerable it is possible to read sensitive information through TFTP service.',
'description':'Module exploits information disclosure vulnerability in Cisco UCM devices. '
'If the target is vulnerable it is possible to read sensitive information through TFTP service.',
@@ -18,7 +18,8 @@ class Exploit(exploits.Exploit):
...
@@ -18,7 +18,8 @@ class Exploit(exploits.Exploit):
"""
"""
__info__={
__info__={
'name':'D-Link DIR-300 & DIR-320 & DIR-600 & DIR-615 Info Disclosure',
'name':'D-Link DIR-300 & DIR-320 & DIR-600 & DIR-615 Info Disclosure',
'description':'Module explois information disclosure vulnerability in D-Link DIR-300, DIR-320, DIR-600, DIR-615 devices. It is possible to retrieve sensitive information such as credentials.',
'description':'Module explois information disclosure vulnerability in D-Link DIR-300, DIR-320, DIR-600,'
'DIR-615 devices. It is possible to retrieve sensitive information such as credentials.',
'description':'Module exploits authentication bypass vulnerability in D-Link DIR-300, DIR-320, DIR-615 revD devices. It is possible to access administration panel without providing password.',
'description':'Module exploits authentication bypass vulnerability in D-Link DIR-300, DIR-320, DIR-615'
'revD devices. It is possible to access administration panel without providing password.',
'authors':[
'authors':[
'Craig Heffner',# vulnerability discovery
'Craig Heffner',# vulnerability discovery
'Karol Celin',# vulnerability discovery
'Karol Celin',# vulnerability discovery
...
@@ -58,7 +59,7 @@ class Exploit(exploits.Exploit):
...
@@ -58,7 +59,7 @@ class Exploit(exploits.Exploit):
@@ -16,7 +16,8 @@ class Exploit(exploits.Exploit):
...
@@ -16,7 +16,8 @@ class Exploit(exploits.Exploit):
"""
"""
__info__={
__info__={
'name':'Huawei HG520 Information Disclosure',
'name':'Huawei HG520 Information Disclosure',
'description':'Module exploits Huawei EchoLife HG520 information disclosure vulnerablity. If the target is vulnerable it is possible to retrieve sensitive information.',
'description':'Module exploits Huawei EchoLife HG520 information disclosure vulnerablity.'
'If the target is vulnerable it is possible to retrieve sensitive information.',
@@ -18,7 +18,8 @@ class Exploit(exploits.Exploit):
...
@@ -18,7 +18,8 @@ class Exploit(exploits.Exploit):
"""
"""
__info__={
__info__={
'name':'IPFire Shellshock',
'name':'IPFire Shellshock',
'description':'Exploits shellshock vulnerability in IPFire M= 2.15 Core Update 82. If the target is vulnerable it is possible to execute commands on operating system level.',
'description':'Exploits shellshock vulnerability in IPFire M= 2.15 Core Update 82.'
'If the target is vulnerable it is possible to execute commands on operating system level.',
@@ -19,7 +19,9 @@ class Exploit(exploits.Exploit):
...
@@ -19,7 +19,9 @@ class Exploit(exploits.Exploit):
"""
"""
__info__={
__info__={
'name':'Linksys WAP54Gv3',
'name':'Linksys WAP54Gv3',
'description':'Module exploits remote command execution in Linksys WAP54Gv3 devices. Debug interface allows executing root privileged shell commands is available on dedicated web pages on the device.',
'description':'Module exploits remote command execution in Linksys WAP54Gv3 devices.'
'Debug interface allows executing root privileged shell commands is available'
@@ -19,24 +19,25 @@ class Exploit(exploits.Exploit):
...
@@ -19,24 +19,25 @@ class Exploit(exploits.Exploit):
"""
"""
__info__={
__info__={
'name':'Netgear ProSafe RCE',
'name':'Netgear ProSafe RCE',
'description':'Module exploits remote command execution vulnerability in Netgear ProSafe WC9500, WC7600, WC7520 devices. If the target is vulnerable command shell is invoked.',
'description':'Module exploits remote command execution vulnerability in Netgear ProSafe'
'WC9500, WC7600, WC7520 devices. If the target is vulnerable command shell is invoked.',