jvazquez-r7
|
795ad70eab
|
Change directory names
|
2013-08-15 22:52:42 -05:00 |
jvazquez-r7
|
cc5804f5f3
|
Add Port for OSVDB 96277
|
2013-08-15 18:34:51 -05:00 |
Tod Beardsley
|
9f5f191a6b
|
Add Main.swf from 593363c
|
2013-07-29 21:53:40 -05:00 |
jvazquez-r7
|
c7361043ae
|
up to date
|
2013-07-17 11:47:06 -05:00 |
jvazquez-r7
|
11f8b351c0
|
Merge branch 'nvidia' of https://github.com/Meatballs1/metasploit-framework
|
2013-07-17 11:44:42 -05:00 |
Meatballs
|
22601e6cc7
|
Exit process when complete
|
2013-07-06 09:27:27 +01:00 |
Meatballs
|
66c2b79177
|
Initial commit
|
2013-07-05 19:48:27 +01:00 |
jvazquez-r7
|
72f19181d1
|
Merge branch 'master' of https://github.com/rapid7/metasploit-framework
|
2013-07-01 16:38:19 -05:00 |
jvazquez-r7
|
a4d353fcb3
|
Clean a little more the VS project
|
2013-06-29 15:15:27 -05:00 |
jvazquez-r7
|
6878534d4b
|
Clean Visual Studio Project
|
2013-06-29 09:20:40 -05:00 |
jvazquez-r7
|
7725937461
|
Add Module for cve-2013-3660
|
2013-06-28 18:18:21 -05:00 |
jvazquez-r7
|
3c1af8217b
|
Land #2011, @matthiaskaiser's exploit for cve-2013-2460
|
2013-06-26 14:35:22 -05:00 |
jvazquez-r7
|
81a2d9d1d5
|
Merge branch 'module_java_jre17_provider_skeleton' of https://github.com/matthiaskaiser/metasploit-framework
|
2013-06-26 14:32:59 -05:00 |
jvazquez-r7
|
d25e1ba44e
|
Make fixes proposed by review and clean
|
2013-06-25 12:58:00 -05:00 |
jvazquez-r7
|
1ade467ac9
|
Merge branch 'master' of https://github.com/rapid7/metasploit-framework
|
2013-06-25 11:10:43 -05:00 |
jvazquez-r7
|
b32513b1b8
|
Fix CVE-2013-2171 with @jlee-r7 feedback
|
2013-06-25 10:40:55 -05:00 |
jvazquez-r7
|
3244013b1f
|
Merge branch 'master' of https://github.com/rapid7/metasploit-framework
|
2013-06-25 09:48:20 -05:00 |
sinn3r
|
6780566a54
|
Add CVE-2013-2171: FreeBSD 9 Address Space Manipulation Module
|
2013-06-24 11:50:21 -05:00 |
Matthias Kaiser
|
8a96b7f9f2
|
added Java7u21 RCE module
Click2Play bypass doesn't seem to work anymore.
|
2013-06-24 02:04:38 -04:00 |
jvazquez-r7
|
9d0047ff74
|
Merge branch 'master' of https://github.com/rapid7/metasploit-framework
|
2013-06-07 16:44:52 -05:00 |
jvazquez-r7
|
7090d4609b
|
Add module for CVE-2013-1488
|
2013-06-07 13:38:41 -05:00 |
jvazquez-r7
|
d5cf6c1fbc
|
Merge branch 'master' of https://github.com/rapid7/metasploit-framework
|
2013-05-23 12:37:54 -05:00 |
sinn3r
|
81ad280107
|
Landing #1856 - CVE-2013-0758 Firefox <= 17.0.1 + Flash RCE
Chained exploit using CVE-2013-0758 and CVE-2013-0757
|
2013-05-23 12:21:10 -05:00 |
Joe Vennix
|
4d5c4f68cb
|
Initial commit, works on three OSes, but automatic mode fails.
|
2013-05-15 23:32:02 -05:00 |
jvazquez-r7
|
b6365db0b5
|
Merge branch 'master' of https://github.com/rapid7/metasploit-framework
|
2013-04-22 09:38:32 -05:00 |
jvazquez-r7
|
19f2e72dbb
|
Added module for Java 7u17 sandboxy bypass
|
2013-04-20 01:43:13 -05:00 |
jvazquez-r7
|
6cd6a7d6b9
|
Merge branch 'master' of https://github.com/rapid7/metasploit-framework
|
2013-03-28 12:16:18 +01:00 |
jvazquez-r7
|
c225d8244e
|
Added module for CVE-2013-1493
|
2013-03-26 22:30:18 +01:00 |
jvazquez-r7
|
74b58185cd
|
up to date
|
2013-03-12 16:48:11 +01:00 |
jvazquez-r7
|
d7b89a2228
|
added security level bypass
|
2013-02-20 17:50:47 +01:00 |
jvazquez-r7
|
d88ad80116
|
Added first version of cve-2013-0431
|
2013-02-20 16:39:53 +01:00 |
jvazquez-r7
|
c8778587f5
|
rename the xml template for s4u
|
2013-02-18 15:25:03 +01:00 |
jvazquez-r7
|
be0feecf8f
|
Merge branch 's4u_persistence' of https://github.com/smilingraccoon/metasploit-framework into smilingraccoon-s4u_persistence
|
2013-02-18 15:22:37 +01:00 |
smilingraccoon
|
3a499b1a6d
|
added s4u_persistence.rb
|
2013-02-10 14:22:36 -05:00 |
SphaZ
|
24de0d2274
|
Data files moved. Updated to use Rex::zip and Msf::Exploit::FILEFORMAT
|
2013-02-04 13:37:09 +01:00 |
jvazquez-r7
|
807bd6e88a
|
Merge branch 'java_jre17_glassfish_averagerangestatisticimpl' of https://github.com/jvazquez-r7/metasploit-framework into jvazquez-r7-java_jre17_glassfish_averagerangestatisticimpl
|
2013-01-22 15:33:39 +01:00 |
jvazquez-r7
|
78279a0397
|
Added new module for cve-2012-5076
|
2013-01-17 21:27:47 +01:00 |
jvazquez-r7
|
d0b9808fc7
|
Added module for CVE-2012-5088
|
2013-01-17 21:14:49 +01:00 |
jvazquez-r7
|
51f3f59d2f
|
cve and references available
|
2013-01-11 00:54:53 +01:00 |
jvazquez-r7
|
876d889d82
|
added exploit for j7u10 0day
|
2013-01-10 20:30:43 +01:00 |
jvazquez-r7
|
133ad04452
|
Cleanup of #1062
|
2012-12-07 11:55:48 +01:00 |
jvazquez-r7
|
b7f304f0db
|
added build exec_payload.msi
|
2012-11-28 21:51:01 +01:00 |
jvazquez-r7
|
5076198ba2
|
fixing bperry comments
|
2012-11-11 20:18:19 +01:00 |
jvazquez-r7
|
8619c5291b
|
Added module for CVE-2012-5076
|
2012-11-11 17:05:51 +01:00 |
David Maloney
|
c30ada5eac
|
Adds temp vbs mod and tweaked decoder stub
|
2012-11-04 12:49:15 -06:00 |
jvazquez-r7
|
b4485fdb2b
|
added chm templates
|
2012-10-10 19:21:47 +02:00 |
h0ng10
|
2b6aa6bbdb
|
Added Exploit for deployfilerepository via JMX
|
2012-09-03 13:50:16 -04:00 |
jvazquez-r7
|
363c0913ae
|
changed dir names according to CVE
|
2012-08-28 16:33:01 +02:00 |
jvazquez-r7
|
52ca1083c2
|
Added java_jre17_exec
|
2012-08-27 11:25:04 +02:00 |
sinn3r
|
f715527423
|
Improve CVE-2012-1535
|
2012-08-21 19:58:21 -05:00 |