jvazquez-r7
|
a4d353fcb3
|
Clean a little more the VS project
|
2013-06-29 15:15:27 -05:00 |
jvazquez-r7
|
6878534d4b
|
Clean Visual Studio Project
|
2013-06-29 09:20:40 -05:00 |
jvazquez-r7
|
7725937461
|
Add Module for cve-2013-3660
|
2013-06-28 18:18:21 -05:00 |
jvazquez-r7
|
3c1af8217b
|
Land #2011, @matthiaskaiser's exploit for cve-2013-2460
|
2013-06-26 14:35:22 -05:00 |
jvazquez-r7
|
d25e1ba44e
|
Make fixes proposed by review and clean
|
2013-06-25 12:58:00 -05:00 |
jvazquez-r7
|
b32513b1b8
|
Fix CVE-2013-2171 with @jlee-r7 feedback
|
2013-06-25 10:40:55 -05:00 |
sinn3r
|
6780566a54
|
Add CVE-2013-2171: FreeBSD 9 Address Space Manipulation Module
|
2013-06-24 11:50:21 -05:00 |
Matthias Kaiser
|
8a96b7f9f2
|
added Java7u21 RCE module
Click2Play bypass doesn't seem to work anymore.
|
2013-06-24 02:04:38 -04:00 |
jvazquez-r7
|
7090d4609b
|
Add module for CVE-2013-1488
|
2013-06-07 13:38:41 -05:00 |
sinn3r
|
81ad280107
|
Landing #1856 - CVE-2013-0758 Firefox <= 17.0.1 + Flash RCE
Chained exploit using CVE-2013-0758 and CVE-2013-0757
|
2013-05-23 12:21:10 -05:00 |
Joe Vennix
|
4d5c4f68cb
|
Initial commit, works on three OSes, but automatic mode fails.
|
2013-05-15 23:32:02 -05:00 |
jvazquez-r7
|
19f2e72dbb
|
Added module for Java 7u17 sandboxy bypass
|
2013-04-20 01:43:13 -05:00 |
jvazquez-r7
|
c225d8244e
|
Added module for CVE-2013-1493
|
2013-03-26 22:30:18 +01:00 |
jvazquez-r7
|
d7b89a2228
|
added security level bypass
|
2013-02-20 17:50:47 +01:00 |
jvazquez-r7
|
d88ad80116
|
Added first version of cve-2013-0431
|
2013-02-20 16:39:53 +01:00 |
jvazquez-r7
|
c8778587f5
|
rename the xml template for s4u
|
2013-02-18 15:25:03 +01:00 |
jvazquez-r7
|
be0feecf8f
|
Merge branch 's4u_persistence' of https://github.com/smilingraccoon/metasploit-framework into smilingraccoon-s4u_persistence
|
2013-02-18 15:22:37 +01:00 |
smilingraccoon
|
3a499b1a6d
|
added s4u_persistence.rb
|
2013-02-10 14:22:36 -05:00 |
SphaZ
|
24de0d2274
|
Data files moved. Updated to use Rex::zip and Msf::Exploit::FILEFORMAT
|
2013-02-04 13:37:09 +01:00 |
jvazquez-r7
|
807bd6e88a
|
Merge branch 'java_jre17_glassfish_averagerangestatisticimpl' of https://github.com/jvazquez-r7/metasploit-framework into jvazquez-r7-java_jre17_glassfish_averagerangestatisticimpl
|
2013-01-22 15:33:39 +01:00 |
jvazquez-r7
|
78279a0397
|
Added new module for cve-2012-5076
|
2013-01-17 21:27:47 +01:00 |
jvazquez-r7
|
d0b9808fc7
|
Added module for CVE-2012-5088
|
2013-01-17 21:14:49 +01:00 |
jvazquez-r7
|
51f3f59d2f
|
cve and references available
|
2013-01-11 00:54:53 +01:00 |
jvazquez-r7
|
876d889d82
|
added exploit for j7u10 0day
|
2013-01-10 20:30:43 +01:00 |
jvazquez-r7
|
133ad04452
|
Cleanup of #1062
|
2012-12-07 11:55:48 +01:00 |
jvazquez-r7
|
b7f304f0db
|
added build exec_payload.msi
|
2012-11-28 21:51:01 +01:00 |
jvazquez-r7
|
5076198ba2
|
fixing bperry comments
|
2012-11-11 20:18:19 +01:00 |
jvazquez-r7
|
8619c5291b
|
Added module for CVE-2012-5076
|
2012-11-11 17:05:51 +01:00 |
David Maloney
|
c30ada5eac
|
Adds temp vbs mod and tweaked decoder stub
|
2012-11-04 12:49:15 -06:00 |
jvazquez-r7
|
b4485fdb2b
|
added chm templates
|
2012-10-10 19:21:47 +02:00 |
h0ng10
|
2b6aa6bbdb
|
Added Exploit for deployfilerepository via JMX
|
2012-09-03 13:50:16 -04:00 |
jvazquez-r7
|
363c0913ae
|
changed dir names according to CVE
|
2012-08-28 16:33:01 +02:00 |
jvazquez-r7
|
52ca1083c2
|
Added java_jre17_exec
|
2012-08-27 11:25:04 +02:00 |
sinn3r
|
f715527423
|
Improve CVE-2012-1535
|
2012-08-21 19:58:21 -05:00 |
sinn3r
|
13df1480c8
|
Add exploit for CVE-2012-1535
|
2012-08-17 12:16:54 -05:00 |
HD Moore
|
430351fe79
|
Better handle of module cache when db_connect is run manually
|
2012-07-10 23:56:48 -05:00 |
LittleLightLittleFire
|
e9ac90f7b0
|
added CVE-2012-1723
|
2012-07-10 12:20:37 +10:00 |
Tod Beardsley
|
414214eb9d
|
Permissions.
|
2012-06-28 11:42:37 -05:00 |
jvazquez-r7
|
6ec990ed85
|
Merge branch 'Openfire-auth-bypass' of https://github.com/h0ng10/metasploit-framework into h0ng10-Openfire-auth-bypass
|
2012-06-27 23:09:26 +02:00 |
h0ng10
|
428ae21928
|
Changed readme.html file (was from the statistics plugin)
|
2012-06-26 12:03:52 -04:00 |
h0ng10
|
6cc8390da9
|
Module rewrite, included Java support, direct upload, plugin deletion
|
2012-06-26 11:56:44 -04:00 |
HD Moore
|
6a91626d94
|
Permissions
|
2012-06-25 00:36:39 -05:00 |
h0ng10
|
65197e79e2
|
added Exploit for CVE-2008-6508 (Openfire Auth bypass)
|
2012-06-24 07:35:38 -04:00 |
jvazquez-r7
|
b891e868f5
|
Added actionscript and swf needed
|
2012-06-23 08:36:35 +02:00 |
sinn3r
|
d7d314862f
|
Need the trigger to actually make it work, duh!
|
2012-06-22 23:16:12 -05:00 |
Tod Beardsley
|
572fb4cb0c
|
Permissions fix
|
2012-06-21 15:39:17 -05:00 |
Steven Seeley
|
fcf42d3e7b
|
added adobe flashplayer array indexing exploit (CVE-2011-2110)
|
2012-06-20 12:52:37 +10:00 |
HD Moore
|
5922ec1f7a
|
Permissions
|
2012-06-12 15:20:25 -05:00 |
sinn3r
|
4743c9fb33
|
Add MS12-005 (CVE-2012-0013) exploit
|
2012-06-10 01:08:28 -05:00 |
HD Moore
|
e8af6882eb
|
Permissions
|
2012-06-06 20:05:29 -05:00 |