joev
|
bdd86bf863
|
Add check for windows bug (RM#8810).
|
2014-06-11 15:09:52 -05:00 |
HD Moore
|
81019ed850
|
Supermicro work
|
2014-06-11 15:03:54 -05:00 |
Tod Beardsley
|
4b8961a464
|
Land #3428, deprecation warns for payloads
|
2014-06-11 09:57:07 -05:00 |
TecR0c
|
278a53c3da
|
Merge pull request #1 from jvazquez-r7/land_3433
Do minor cleanup
|
2014-06-12 00:40:44 +10:00 |
jvazquez-r7
|
34f98ddc50
|
Do minor cleanup
|
2014-06-11 09:20:22 -05:00 |
TecR0c
|
b27b00afbb
|
Added target 4.0 and cleaned up exploit
|
2014-06-11 06:22:47 -07:00 |
TecR0c
|
f1382af018
|
Added target 4.0 and cleaned up exploit
|
2014-06-11 06:20:49 -07:00 |
Meatballs1
|
165a65fdb4
|
Merge pull request #49 from todb-r7/fix-pr3428-deprecated
Avoid double-printing with setup and init_ui
|
2014-06-11 09:28:06 +01:00 |
William Vu
|
6ca5cf6c26
|
Add Chromecast YouTube remote control
|
2014-06-11 00:08:08 -05:00 |
Tod Beardsley
|
b379dc014a
|
Avoid double-printing with setup and init_ui
|
2014-06-10 13:57:25 -05:00 |
Tod Beardsley
|
44540e6d00
|
Land #3437, CSS Injection MITM scanner
|
2014-06-10 13:36:35 -05:00 |
jvazquez-r7
|
4aa1fee398
|
Land #3326, @FireFart's Heartbleed - server response parsing
|
2014-06-10 13:27:28 -05:00 |
jvazquez-r7
|
9aa2978589
|
Land jvazquez-r7/metasploit-framework#14, @todb-r7's fixes
|
2014-06-10 10:42:34 -05:00 |
Tod Beardsley
|
521284253f
|
Be more clear about the vuln and impact
|
2014-06-10 10:29:23 -05:00 |
jvazquez-r7
|
2c8a99143b
|
Land #3426, @Meatballs1's Python v2.3.3 Compatible Command Shell payloads
|
2014-06-10 09:55:58 -05:00 |
jvazquez-r7
|
3ec15b6512
|
Land #3431, @bcoles's new targets for efs_easychatserver_username
|
2014-06-10 09:52:16 -05:00 |
jvazquez-r7
|
a554b25855
|
Use EXITFUNC
|
2014-06-10 09:51:06 -05:00 |
jvazquez-r7
|
9b55f5143a
|
Add module for CVE-2014-0224
|
2014-06-09 17:38:11 -05:00 |
Meatballs
|
dc69afebb1
|
License and Require
|
2014-06-09 21:41:38 +01:00 |
jvazquez-r7
|
e953fcbd97
|
Land #3436, @todb-r7's cleanup for dtls_fragment_overflow
|
2014-06-09 13:47:27 -05:00 |
Tod Beardsley
|
4103f2295b
|
Missing comma
|
2014-06-09 13:44:46 -05:00 |
Tod Beardsley
|
0e14d77dba
|
Minor fixup on DTLS module
|
2014-06-09 13:42:30 -05:00 |
jvazquez-r7
|
0e611b5d64
|
Land #3429, @jhart-r7's auxiliary module for CVE-2014-0195
|
2014-06-09 13:34:38 -05:00 |
jvazquez-r7
|
ed5d83a41b
|
Add vulnerability discoverer
|
2014-06-09 13:25:33 -05:00 |
jvazquez-r7
|
daf662b3c0
|
Do minor cleanup
|
2014-06-09 13:23:56 -05:00 |
jvazquez-r7
|
1f33566033
|
Land #3432, @Meatballs1 sap_soap_rfc_brute_login's clean up
|
2014-06-09 11:39:52 -05:00 |
TecR0c
|
3d33a82c1c
|
Changed to unless
|
2014-06-09 09:31:14 -07:00 |
TecR0c
|
1252eea4b9
|
Changed to unless
|
2014-06-09 09:26:03 -07:00 |
jvazquez-r7
|
b39b41e29f
|
Land #3371, @Meatballs1 fix for sap_mgmt_con_getprocessparameter
|
2014-06-09 11:25:01 -05:00 |
Jon Hart
|
06e45e8253
|
Clean up TLS fragment building
|
2014-06-09 08:39:30 -07:00 |
TecR0c
|
79bc2b9e80
|
Merge remote-tracking branch 'origin/module-efs-fmws-userid-bof' into module-efs-fmws-userid-bof
|
2014-06-09 03:34:43 -07:00 |
TecR0c
|
52d26f290f
|
Added check in exploit func
|
2014-06-09 03:23:14 -07:00 |
Meatballs
|
76b5297d3f
|
Land #3434, Fix original psh payload VirtualAlloc call
|
2014-06-08 17:39:39 +01:00 |
Meatballs
|
d868294d5b
|
MEM_RESERVE too
|
2014-06-08 17:37:57 +01:00 |
jvazquez-r7
|
9d08ebe273
|
Fix VirtualAlloc call on PSH old template
|
2014-06-08 11:09:03 -05:00 |
jvazquez-r7
|
e4d14194bb
|
Add module for Rocket Servergraph ZDI-14-161 and ZDI-14-162
|
2014-06-08 11:07:10 -05:00 |
Meatballs
|
25ed68af6e
|
Land #3017, Windows x86 Shell Hidden Bind
A bind shellcode that responds as 'closed' unless the client matches the
AHOST ip.
|
2014-06-08 13:49:49 +01:00 |
TecR0c
|
323ac17979
|
Update efs_fmws_userid_bof.rb
Removed test sploit line.
|
2014-06-08 21:29:12 +10:00 |
TecR0c
|
8ecafbc49e
|
Easy File Management Web Server v5.3 Stack Buffer Overflow
|
2014-06-08 04:21:14 -07:00 |
Christian Mehlmauer
|
099003708c
|
Land #3422, SAP Bruterforcer datastore cleanup
|
2014-06-08 08:42:27 +02:00 |
Brandon Perry
|
4367e8ef0c
|
Update mongodb_js_inject_collection_enum.rb
Fix some logic bugs that caused incorrect results.
|
2014-06-07 21:03:28 -05:00 |
Brandon Perry
|
dc89621d5c
|
Update mongodb_js_inject_collection_enum.rb
No need to make extra requests. Off by one.
|
2014-06-07 20:09:00 -05:00 |
Brandon Perry
|
2663af986b
|
Update mongodb_js_inject_collection_enum.rb
This adds a bit more error handling, and better decision making in regards to false responses.
|
2014-06-07 19:58:12 -05:00 |
Julian Vilas
|
73536f2ac0
|
Add support Java 8
|
2014-06-07 22:43:14 +02:00 |
Brendan Coles
|
6bef6edb81
|
Update efs_easychatserver_username.rb
Add targets for versions 2.0 to 3.1.
Add install path detection for junk size calculation.
Add version detection for auto targeting.
|
2014-06-08 06:36:18 +10:00 |
Jon Hart
|
a7a1a2bf3b
|
Move dtls_fragment_overflow.rb under ssl where it belongs
|
2014-06-07 12:56:34 -07:00 |
Brandon Perry
|
4071fb332b
|
Create mongodb_js_inject_collection_enum.rb
This module was tested against a small php application I wrote interfacing with MongoDB 2.2.7
https://gist.github.com/brandonprry/c2de8ac2be825007c4de
|
2014-06-07 11:20:34 -05:00 |
Borja Merino
|
5881f9453f
|
Merge pull request #5 from Meatballs1/hidden_bind
Remove bind hidden handler
|
2014-06-07 17:43:25 +02:00 |
Meatballs
|
2be6b8befe
|
Remove bind hidden handler
|
2014-06-07 14:34:20 +01:00 |
Meatballs
|
bf1a665259
|
Land #2657, Dynamic generation of windows service executable functions
Allows a user to specify non service executables as EXE::Template as
long as the file has enough size to store the payload.
|
2014-06-07 13:28:20 +01:00 |