sinn3r
|
99009da567
|
Merge branch 'mobilecartly_upload_exec' of https://github.com/wchen-r7/metasploit-framework into wchen-r7-mobilecartly_upload_exec
|
2012-09-04 14:32:23 -05:00 |
sinn3r
|
e926bc16ba
|
Add MobileCartly 1.0 module
|
2012-09-04 14:23:16 -05:00 |
jvazquez-r7
|
4a92cc4641
|
jboss_invoke_deploy module cleanup
|
2012-09-04 18:49:11 +02:00 |
jvazquez-r7
|
cb40a0c362
|
Merge branch 'jboss-jmx-invoke-deploy' of https://github.com/h0ng10/metasploit-framework into h0ng10-jboss-jmx-invoke-deploy
|
2012-09-04 18:47:30 +02:00 |
sinn3r
|
783ffb13c2
|
Add Adobe security bulletin references
|
2012-09-04 00:07:53 -05:00 |
sinn3r
|
b3bfaec089
|
Add reference about the patch
|
2012-09-03 23:58:21 -05:00 |
sinn3r
|
9d97dc8327
|
Add Metasploit blogs as references, because they're useful.
|
2012-09-03 15:57:27 -05:00 |
h0ng10
|
2b6aa6bbdb
|
Added Exploit for deployfilerepository via JMX
|
2012-09-03 13:50:16 -04:00 |
sinn3r
|
9ab62de637
|
Fix a spelling error
|
2012-09-03 01:44:02 -05:00 |
jvazquez-r7
|
943121dd61
|
Added module for CVE-2012-2611
|
2012-09-03 00:15:56 +02:00 |
sinn3r
|
d106a1150e
|
Be more clear that we dislike certain PDF templates
|
2012-08-31 14:07:58 -05:00 |
sinn3r
|
f48fbaccb0
|
Add Oracle's security alert
|
2012-08-30 14:04:16 -05:00 |
sinn3r
|
4758eb0dc3
|
Merge branch 'jvazquez-r7-taget_host_glassflish_deployer'
|
2012-08-30 12:18:02 -05:00 |
jvazquez-r7
|
f99982a85e
|
added java as platform to avoid confussion between target and payload
|
2012-08-30 18:39:20 +02:00 |
jvazquez-r7
|
4fd9f88304
|
avoid the redefinition of Module.target_host
|
2012-08-30 14:45:14 +02:00 |
jvazquez-r7
|
f439f256b5
|
Debug line deleted on
|
2012-08-30 00:18:07 +02:00 |
sinn3r
|
c3159e369a
|
A lot gotcha
When res is nil, that condition can fall into the 'else' clause.
If that happens, we can trigger a bug when we try to read res.code.
|
2012-08-29 14:46:35 -05:00 |
sinn3r
|
b70e205a7e
|
Merge branch 'sap_host_control_cmd_exec' of https://github.com/jvazquez-r7/metasploit-framework into jvazquez-r7-sap_host_control_cmd_exec
|
2012-08-29 14:45:46 -05:00 |
sinn3r
|
5f64c55112
|
Update description
|
2012-08-29 11:10:35 -05:00 |
jvazquez-r7
|
6a24e042f9
|
fixing indentation
|
2012-08-29 16:17:56 +02:00 |
jvazquez-r7
|
2ed712949e
|
Added check function
|
2012-08-29 16:12:11 +02:00 |
jvazquez-r7
|
72cb39925a
|
Added exploit for OSVDB 84821
|
2012-08-29 12:17:44 +02:00 |
jvazquez-r7
|
363c0913ae
|
changed dir names according to CVE
|
2012-08-28 16:33:01 +02:00 |
sinn3r
|
34b12c4f55
|
Update CVE/OSVDB refs
|
2012-08-28 01:21:32 -05:00 |
jvazquez-r7
|
6e2369680b
|
Safari added
|
2012-08-28 02:04:03 +02:00 |
jvazquez-r7
|
30fd2cf256
|
Description updated
|
2012-08-28 02:01:26 +02:00 |
sinn3r
|
7e579db705
|
Add AlienVault reference
|
2012-08-27 13:29:27 -05:00 |
sinn3r
|
15a87a79f8
|
Add mihi's analysis
|
2012-08-27 13:24:43 -05:00 |
jvazquez-r7
|
52ca1083c2
|
Added java_jre17_exec
|
2012-08-27 11:25:04 +02:00 |
sinn3r
|
8e56d4f2eb
|
This reference is too damn useful, must add
|
2012-08-25 16:05:58 -05:00 |
sinn3r
|
d51f8cad25
|
Change title and description
|
2012-08-24 15:39:56 -05:00 |
sinn3r
|
ea7d7b847a
|
Merge branch 'master' of github.com:rapid7/metasploit-framework
|
2012-08-24 11:17:14 -05:00 |
jvazquez-r7
|
179e816194
|
Merge branch 'esva_bid' of https://github.com/jvazquez-r7/metasploit-framework into jvazquez-r7-esva_bid
|
2012-08-24 17:37:25 +02:00 |
jvazquez-r7
|
8f748d833a
|
Added BID reference
|
2012-08-24 17:30:52 +02:00 |
jvazquez-r7
|
e27f736e95
|
BID reference added
|
2012-08-24 17:29:12 +02:00 |
jvazquez-r7
|
e461d542ac
|
added Windows 2003 SP1 Spanish targets
|
2012-08-24 12:50:30 +02:00 |
jvazquez-r7
|
54ce7268ad
|
modules/exploits/windows/smb/ms08_067_netapi.rb
|
2012-08-24 11:30:23 +02:00 |
jvazquez-r7
|
1a60abc7a7
|
Added W2003 SP2 Spanish targets
|
2012-08-24 11:16:08 +02:00 |
jvazquez-r7
|
261a17d28a
|
Added module for CVE-2009-4498
|
2012-08-23 18:29:39 +02:00 |
jvazquez-r7
|
57c6385279
|
heap spray from flash works pretty well on ie9 too
|
2012-08-22 20:47:11 +02:00 |
jvazquez-r7
|
730c0e9368
|
added windows vista and w7 targets
|
2012-08-22 20:13:10 +02:00 |
sinn3r
|
22051c9c2c
|
Merge branch 'flash_exploit_r2' of https://github.com/wchen-r7/metasploit-framework into wchen-r7-flash_exploit_r2
|
2012-08-22 10:00:34 -05:00 |
sinn3r
|
1b6fe22359
|
Give proper credit to Craig plus additional references
Craig first found the buffer overflow. But Matt found a more
reliable way to exploit the flaw.
|
2012-08-21 22:48:15 -05:00 |
sinn3r
|
f715527423
|
Improve CVE-2012-1535
|
2012-08-21 19:58:21 -05:00 |
jvazquez-r7
|
0e535e6485
|
added module for XODA file upload RCE
|
2012-08-22 00:54:13 +02:00 |
sinn3r
|
7ddcc787bd
|
Merge branch 'jboss-exploits-revision2' of https://github.com/h0ng10/metasploit-framework into h0ng10-jboss-exploits-revision2
|
2012-08-21 14:37:09 -05:00 |
jvazquez-r7
|
3106f87687
|
badchars fixed
|
2012-08-21 13:30:15 +02:00 |
jvazquez-r7
|
e21ea6999c
|
added module for ESVA Command Injection Vulnerability
|
2012-08-21 13:25:03 +02:00 |
jvazquez-r7
|
3da8a59cf0
|
a little cleanup plus complete metadata
|
2012-08-20 22:42:54 +02:00 |
Matt Andreko
|
d226135986
|
Code Review Feedback
Removed trailing spaces and fixed indenting.
|
2012-08-20 10:41:42 -04:00 |