Tab Assassin
|
41e4375e43
|
Retab modules
|
2013-08-30 16:28:54 -05:00 |
Tod Beardsley
|
ca313806ae
|
Trivial grammar and word choice fixes for modules
|
2013-08-19 13:24:42 -05:00 |
jvazquez-r7
|
1a3b4eebdb
|
Fix directory name on ruby
|
2013-08-15 22:54:31 -05:00 |
jvazquez-r7
|
795ad70eab
|
Change directory names
|
2013-08-15 22:52:42 -05:00 |
jvazquez-r7
|
c5c2aebf15
|
Update references
|
2013-08-15 22:04:15 -05:00 |
jvazquez-r7
|
cc5804f5f3
|
Add Port for OSVDB 96277
|
2013-08-15 18:34:51 -05:00 |
HD Moore
|
6c1ba9c9c9
|
Switch to Failure vs Exploit::Failure
|
2013-08-15 14:14:46 -05:00 |
jvazquez-r7
|
4fa789791d
|
Explain Ranking
|
2013-06-25 13:10:15 -05:00 |
jvazquez-r7
|
127300c62d
|
Fix also ruby module
|
2013-06-25 12:59:42 -05:00 |
Matthias Kaiser
|
8a96b7f9f2
|
added Java7u21 RCE module
Click2Play bypass doesn't seem to work anymore.
|
2013-06-24 02:04:38 -04:00 |
Steve Tornio
|
a824a0583e
|
add osvdb ref 89059
|
2013-06-20 07:34:15 -05:00 |
Joe Vennix
|
45da645717
|
Update ff svg exploit description to be more accurate.
|
2013-06-11 12:12:18 -05:00 |
Tod Beardsley
|
f58e279066
|
Cleanup on module names, descriptions.
|
2013-06-10 10:52:22 -05:00 |
jvazquez-r7
|
79bfdf3ca6
|
Add comment to explain the applet delivery methods
|
2013-06-07 14:20:21 -05:00 |
jvazquez-r7
|
641fd3c6ce
|
Add also the msf module
|
2013-06-07 13:39:19 -05:00 |
Steve Tornio
|
80f1e98952
|
added osvdb refs
|
2013-06-01 07:04:43 -05:00 |
Tod Beardsley
|
75d6c8079a
|
Spelling, whitespace
Please be sure to run msftidy.rb on new modules. Thanks!
|
2013-05-28 10:03:37 -05:00 |
sinn3r
|
81ad280107
|
Landing #1856 - CVE-2013-0758 Firefox <= 17.0.1 + Flash RCE
Chained exploit using CVE-2013-0758 and CVE-2013-0757
|
2013-05-23 12:21:10 -05:00 |
sinn3r
|
67861794f6
|
Fix automatic payload selection
|
2013-05-22 22:37:18 -05:00 |
sinn3r
|
23fe3146dc
|
Extra print_status I don't want
|
2013-05-22 14:38:30 -05:00 |
sinn3r
|
0e6576747a
|
Fix target selection probs, and swf path
|
2013-05-22 14:34:00 -05:00 |
Joe Vennix
|
aae4768563
|
Fix whitespace issues from msftidy.
|
2013-05-21 14:31:36 -05:00 |
Joe Vennix
|
eaeb10742a
|
Add some comments and clean some things up.
|
2013-05-21 14:01:14 -05:00 |
Joe Vennix
|
978aafcb16
|
Add DEBUG option, pass args to .encoded_exe().
|
2013-05-21 14:01:14 -05:00 |
Joe Vennix
|
ee8a97419c
|
Add some debug print calls to investigate Auto platform selection.
|
2013-05-21 14:01:13 -05:00 |
Joe Vennix
|
60fdf48535
|
Use renegerate_payload(cli, ...).
|
2013-05-21 14:01:13 -05:00 |
Joe Vennix
|
1a5c747bb9
|
Update description.
|
2013-05-15 23:52:51 -05:00 |
Joe Vennix
|
178a43a772
|
Whitespace tweaks and minor bug fix. Wrong payloads still run.
|
2013-05-15 23:47:04 -05:00 |
Joe Vennix
|
f4b6db8c49
|
Tweak whitespace.
|
2013-05-15 23:35:59 -05:00 |
Joe Vennix
|
a7d79e2a51
|
Oops, don't cache payload_filename.
|
2013-05-15 23:34:14 -05:00 |
Joe Vennix
|
4d5c4f68cb
|
Initial commit, works on three OSes, but automatic mode fails.
|
2013-05-15 23:32:02 -05:00 |
jvazquez-r7
|
bf0375f0e9
|
Fix @jlee-r7's feedback
|
2013-04-25 18:43:21 -05:00 |
jvazquez-r7
|
8eea476cb8
|
Build the jnlp uri when resource is available
|
2013-04-25 18:43:21 -05:00 |
jvazquez-r7
|
cc961977a2
|
Add bypass for click2play
|
2013-04-25 18:43:21 -05:00 |
jvazquez-r7
|
ece36c0610
|
Update references for the las Java exploit
|
2013-04-22 21:55:04 -05:00 |
jvazquez-r7
|
1365dfe68c
|
Add Oracle url
|
2013-04-20 01:43:14 -05:00 |
jvazquez-r7
|
b99fc06b6f
|
description updated
|
2013-04-20 01:43:14 -05:00 |
jvazquez-r7
|
19f2e72dbb
|
Added module for Java 7u17 sandboxy bypass
|
2013-04-20 01:43:13 -05:00 |
jvazquez-r7
|
1913d60d65
|
multibrowser support
|
2013-02-21 01:13:25 +01:00 |
jvazquez-r7
|
bf216cca5c
|
description and references updated
|
2013-02-20 18:14:53 +01:00 |
jvazquez-r7
|
d7b89a2228
|
added security level bypass
|
2013-02-20 17:50:47 +01:00 |
jvazquez-r7
|
d88ad80116
|
Added first version of cve-2013-0431
|
2013-02-20 16:39:53 +01:00 |
booboule
|
8bcf4a86ef
|
Update modules/exploits/multi/browser/java_jre17_method_handle.rb
Wrong reference type (URL instead of OSVDB)
|
2013-01-23 17:14:53 +01:00 |
jvazquez-r7
|
807bd6e88a
|
Merge branch 'java_jre17_glassfish_averagerangestatisticimpl' of https://github.com/jvazquez-r7/metasploit-framework into jvazquez-r7-java_jre17_glassfish_averagerangestatisticimpl
|
2013-01-22 15:33:39 +01:00 |
jvazquez-r7
|
3465aa00bd
|
title updated
|
2013-01-18 18:42:27 +01:00 |
jvazquez-r7
|
ef16a7fd24
|
cleanup
|
2013-01-17 21:45:13 +01:00 |
jvazquez-r7
|
670b4e8e06
|
cleanup
|
2013-01-17 21:39:41 +01:00 |
jvazquez-r7
|
78279a0397
|
Added new module for cve-2012-5076
|
2013-01-17 21:27:47 +01:00 |
jvazquez-r7
|
d0b9808fc7
|
Added module for CVE-2012-5088
|
2013-01-17 21:14:49 +01:00 |
joe
|
771fc07264
|
Change :vuln_test to :os_name for checking OS.
|
2013-01-14 02:17:40 -06:00 |