|
79530 | 79530 | "session_types": false, |
79531 | 79531 | "needs_cleanup": true |
79532 | 79532 | }, |
| 79533 | + "exploit_linux/http/netalertx_rce_cve_2024_46506": { |
| 79534 | + "name": "Unauthenticated RCE in NetAlertX", |
| 79535 | + "fullname": "exploit/linux/http/netalertx_rce_cve_2024_46506", |
| 79536 | + "aliases": [ |
| 79537 | + |
| 79538 | + ], |
| 79539 | + "rank": 600, |
| 79540 | + "disclosure_date": "2025-01-30", |
| 79541 | + "type": "exploit", |
| 79542 | + "author": [ |
| 79543 | + "Chebuya (Rhino Security Labs)", |
| 79544 | + "Takahiro Yokoyama" |
| 79545 | + ], |
| 79546 | + "description": "An attacker can update NetAlertX settings with no authentication, which results in RCE.", |
| 79547 | + "references": [ |
| 79548 | + "CVE-2024-46506", |
| 79549 | + "URL-https://rhinosecuritylabs.com/research/cve-2024-46506-rce-in-netalertx/" |
| 79550 | + ], |
| 79551 | + "platform": "Linux", |
| 79552 | + "arch": "", |
| 79553 | + "rport": 20211, |
| 79554 | + "autofilter_ports": [ |
| 79555 | + 80, |
| 79556 | + 8080, |
| 79557 | + 443, |
| 79558 | + 8000, |
| 79559 | + 8888, |
| 79560 | + 8880, |
| 79561 | + 8008, |
| 79562 | + 3000, |
| 79563 | + 8443 |
| 79564 | + ], |
| 79565 | + "autofilter_services": [ |
| 79566 | + "http", |
| 79567 | + "https" |
| 79568 | + ], |
| 79569 | + "targets": [ |
| 79570 | + "Linux Command" |
| 79571 | + ], |
| 79572 | + "mod_time": "2025-02-11 11:25:24 +0000", |
| 79573 | + "path": "/modules/exploits/linux/http/netalertx_rce_cve_2024_46506.rb", |
| 79574 | + "is_install_path": true, |
| 79575 | + "ref_name": "linux/http/netalertx_rce_cve_2024_46506", |
| 79576 | + "check": true, |
| 79577 | + "post_auth": false, |
| 79578 | + "default_credential": false, |
| 79579 | + "notes": { |
| 79580 | + "Stability": [ |
| 79581 | + "crash-safe" |
| 79582 | + ], |
| 79583 | + "SideEffects": [ |
| 79584 | + "config-changes", |
| 79585 | + "artifacts-on-disk", |
| 79586 | + "ioc-in-logs" |
| 79587 | + ], |
| 79588 | + "Reliability": [ |
| 79589 | + "repeatable-session" |
| 79590 | + ] |
| 79591 | + }, |
| 79592 | + "session_types": false, |
| 79593 | + "needs_cleanup": null |
| 79594 | + }, |
79533 | 79595 | "exploit_linux/http/netgear_dgn1000_setup_unauth_exec": { |
79534 | 79596 | "name": "Netgear DGN1000 Setup.cgi Unauthenticated RCE", |
79535 | 79597 | "fullname": "exploit/linux/http/netgear_dgn1000_setup_unauth_exec", |
@@ -192323,6 +192385,65 @@ |
192323 | 192385 | "session_types": false, |
192324 | 192386 | "needs_cleanup": null |
192325 | 192387 | }, |
| 192388 | + "exploit_windows/scada/mypro_mgr_cmd": { |
| 192389 | + "name": "mySCADA myPRO Manager Unauthenticated Command Injection (CVE-2024-47407)", |
| 192390 | + "fullname": "exploit/windows/scada/mypro_mgr_cmd", |
| 192391 | + "aliases": [ |
| 192392 | + |
| 192393 | + ], |
| 192394 | + "rank": 600, |
| 192395 | + "disclosure_date": "2024-11-21", |
| 192396 | + "type": "exploit", |
| 192397 | + "author": [ |
| 192398 | + "Michael Heinzl" |
| 192399 | + ], |
| 192400 | + "description": "Unauthenticated Command Injection in MyPRO Manager <= v1.2 from mySCADA.\n The vulnerability can be exploited by a remote attacker to inject arbitrary operating system commands which will get executed in the context of the myscada9 administrative user that is automatically added by the product.", |
| 192401 | + "references": [ |
| 192402 | + "URL-https://www.cisa.gov/news-events/ics-advisories/icsa-24-326-07", |
| 192403 | + "CVE-2024-47407" |
| 192404 | + ], |
| 192405 | + "platform": "Windows", |
| 192406 | + "arch": "cmd", |
| 192407 | + "rport": 34022, |
| 192408 | + "autofilter_ports": [ |
| 192409 | + 80, |
| 192410 | + 8080, |
| 192411 | + 443, |
| 192412 | + 8000, |
| 192413 | + 8888, |
| 192414 | + 8880, |
| 192415 | + 8008, |
| 192416 | + 3000, |
| 192417 | + 8443 |
| 192418 | + ], |
| 192419 | + "autofilter_services": [ |
| 192420 | + "http", |
| 192421 | + "https" |
| 192422 | + ], |
| 192423 | + "targets": [ |
| 192424 | + "Windows_Fetch" |
| 192425 | + ], |
| 192426 | + "mod_time": "2025-01-29 20:18:05 +0000", |
| 192427 | + "path": "/modules/exploits/windows/scada/mypro_mgr_cmd.rb", |
| 192428 | + "is_install_path": true, |
| 192429 | + "ref_name": "windows/scada/mypro_mgr_cmd", |
| 192430 | + "check": true, |
| 192431 | + "post_auth": false, |
| 192432 | + "default_credential": false, |
| 192433 | + "notes": { |
| 192434 | + "Stability": [ |
| 192435 | + "crash-safe" |
| 192436 | + ], |
| 192437 | + "Reliability": [ |
| 192438 | + "repeatable-session" |
| 192439 | + ], |
| 192440 | + "SideEffects": [ |
| 192441 | + "ioc-in-logs" |
| 192442 | + ] |
| 192443 | + }, |
| 192444 | + "session_types": false, |
| 192445 | + "needs_cleanup": null |
| 192446 | + }, |
192326 | 192447 | "exploit_windows/scada/procyon_core_server": { |
192327 | 192448 | "name": "Procyon Core Server HMI Coreservice.exe Stack Buffer Overflow", |
192328 | 192449 | "fullname": "exploit/windows/scada/procyon_core_server", |
|
0 commit comments