sinn3r
b514124997
Land #1979 - OSVDB update
2013-06-18 10:42:09 -05:00
sinn3r
fbd16a2f3e
Land #1978 - OSVDB update
2013-06-18 10:41:33 -05:00
sinn3r
1e46f7df48
Land #1977 - OSVDB update
2013-06-18 10:40:55 -05:00
sinn3r
d0ed9a6687
Land #1976 - OSVDB update
2013-06-18 10:40:00 -05:00
jvazquez-r7
aa134b0bcc
Land #1973 , @wchen-r7's fix to handle ftp auth correctly
2013-06-18 09:34:55 -05:00
Steve Tornio
e278ac5061
add osvdb ref 91841
2013-06-18 06:41:30 -05:00
Steve Tornio
404a9f0669
add osvdb ref 89594
2013-06-18 06:25:57 -05:00
Steve Tornio
27158d89c7
add osvdb ref 89105
2013-06-18 06:15:29 -05:00
Steve Tornio
2afc90a8de
fix typos
2013-06-18 06:05:45 -05:00
Steve Tornio
2c3181b56b
add osvdb ref 90627
2013-06-18 05:59:39 -05:00
sinn3r
070111a520
Land #1975 - Add CVE-2012-6081 (MoinMoin twikidraw Action Traversal)
2013-06-17 22:31:36 -05:00
sinn3r
3223ea799c
An invalid WritablePage option can result the same message as well.
2013-06-17 22:30:44 -05:00
jvazquez-r7
044bd2101f
Authenticate against the page to modify
2013-06-17 20:34:02 -05:00
Tod Beardsley
4ca9a88324
Tidying up grammar and titles
2013-06-17 16:49:14 -05:00
jvazquez-r7
0bd6ca2a6a
Add module for CVE-2012-6081
2013-06-17 16:13:55 -05:00
sinn3r
820f589df0
Missed this one.
2013-06-17 15:52:53 -05:00
sinn3r
163d3e771b
Handle connect_login return value properly
...
Some modules ignore connect_login's return value, which may result
an EOF if send_cmd() is used later on. All the modules fixed are
the ones require auth according to the module description, or
CVE/vendor/OSVDB info.
2013-06-17 15:48:34 -05:00
William Vu
b51349ed77
Land #1968 , OSVDB reference for ManageEngine
2013-06-17 10:30:05 -05:00
Steve Tornio
e37a0b871f
add osvdb ref 86562
2013-06-17 06:04:54 -05:00
Steve Tornio
6e57ecab59
add osvdb ref 79246 and edb ref 18492
2013-06-17 05:58:00 -05:00
Steve Tornio
e17ccdda3a
add osvdb ref 68662
2013-06-16 18:11:13 -05:00
William Vu
0cf2751ec1
Land #1965 , OSVDB reference for pBot
2013-06-15 07:39:25 -05:00
Steve Tornio
d35dd73328
add osvdb ref 84913
2013-06-15 07:30:23 -05:00
William Vu
638175a6be
Land #1964 , OSVDB reference for StorageWorks
2013-06-15 07:27:43 -05:00
Steve Tornio
0c6157694f
add osvdb ref 82087
2013-06-15 07:22:32 -05:00
Steve Tornio
6e8b844954
add osvdb ref 89611
2013-06-15 07:12:44 -05:00
Steve Tornio
63483a979d
add osvdb ref 89611
2013-06-15 07:09:26 -05:00
William Vu
bd17e67f75
Land #1960 , lower ranking for MS13-009
2013-06-14 15:28:06 -05:00
sinn3r
2abf70a1ca
Lower ranking for MS13-009
...
We haven't been able to make this one more reliable, so todb suggests
we lower the ranking first.
2013-06-14 15:24:43 -05:00
sinn3r
d35c3469e8
Fix typo
...
EDB reference
2013-06-14 15:16:20 -05:00
sinn3r
0d384d23b8
Land #1954 - Fix resource_uri and mp4 file path
2013-06-14 13:15:17 -05:00
sinn3r
933ac88b44
Missing the file param that's needed to download the mp4
2013-06-14 13:13:48 -05:00
sinn3r
d2df3234f4
Land #1955 - mozilla_mchannel.rb undefined agent variable
2013-06-14 11:14:20 -05:00
sinn3r
223807d0df
Land #1956 - fix regex error for mozilla_reduceright.rb
2013-06-14 11:09:49 -05:00
Ruslaideemin
ca0ab8d6ee
maxthon_history_xcs.rb - fix User-agent string
...
request.headers['User-agent'] is incorrect, it should be
request.headers['User-Agent'].
Downloaded following version from oldapps.com to confirm
the exploit code is wrong.
Supported Systems Windows 98, 2000 (Maxthon 2.5.15 Build
1000), XP, Vista, 7, 8
MD5 Checksum F3791637C886A46940876211209F82F4
SHA1 Checksum 039BB218245E5DC1BAB0F57298C68AC487F86323
Release Date 20 October, 2011 (2 years ago )
2013-06-11 13:37:21 +10:00
jvazquez-r7
69c25014ae
Make msftidy happy
2013-06-13 18:58:38 -05:00
sinn3r
12801430e3
Update both ultraiso files to the right fix
2013-06-13 18:44:19 -05:00
sinn3r
0440c03c7a
Land #1934 - Fix UltraISO Exploit File Creation
2013-06-13 13:57:09 -05:00
jvazquez-r7
81813a78fc
Fix module Name
2013-06-13 11:55:23 -05:00
jvazquez-r7
afb2f83238
Add module for CVE-2012-1533
2013-06-12 14:40:53 -05:00
jvazquez-r7
c38eabe481
Fix description, code and perform test
2013-06-12 11:07:03 -05:00
jvazquez-r7
5c8053491f
Add DEP bypass for ntdll ms12-001
2013-06-12 10:41:05 -05:00
jvazquez-r7
a1c7961cbc
Suport js obfuscation for the trigger
2013-06-12 08:06:12 -05:00
jvazquez-r7
5240c6e164
Add module for MS13-037 CVE-2013-2551
2013-06-12 07:37:57 -05:00
Joe Vennix
45da645717
Update ff svg exploit description to be more accurate.
2013-06-11 12:12:18 -05:00
sinn3r
081baad68c
Remove variable 'overflow' because it's not used
...
The 'overflow' variable isn't needed
2013-06-11 02:26:45 -05:00
Ruslaideemin
4e41e871bb
mozilla_reduceright.rb - fix regex error.
...
[] is character class, and will match on 1, 6, 7, and |.
Where as (16|17) will match on either 16, or 17.
irb(main):053:0> y = /Firefox\/3\.6\.[16|17]/
=> /Firefox\/3\.6\.[16|17]/
irb(main):054:0> x = "Firefox/3.6.13"
=> "Firefox/3.6.13"
irb(main):055:0> x =~ y
=> 0
irb(main):056:0> y = /Firefox\/3\.6\.(16|17)/
=> /Firefox\/3\.6\.(16|17)/
irb(main):057:0> x =~ y
=> nil
2013-06-11 11:52:27 +10:00
Ruslaideemin
996171b35f
mozilla_mchannel.rb undefined agent variable
...
If the TARGET is chosen instead of using the default
automatic, the agent variable will be undefined, which
causes the exploit to fail.
2013-06-11 10:43:47 +10:00
Ruslaideemin
d91b412661
adobe_flash_sps.rb - resource_uri vs get_resource
...
resource_uri will randomize the returned uri unless
datastore['URIPATH"] is set.
get_resource will return the currently used reosurce_uri
Since the incorrect type is used, this exploit is completely broken.
Tested fix with both URIPATH set to / and unset, and it works after
redirect.
2013-06-11 07:13:02 +10:00
sinn3r
0895184e1f
Land #1932 - Actually support OUTPUTPATH datastore option
2013-06-10 11:22:28 -05:00