Ramon de C Valle
|
11f82de098
|
Update author information
|
2012-09-19 14:00:51 -03:00 |
sinn3r
|
cc8102434a
|
CVE assigned for the IE '0day'
|
2012-09-18 16:13:27 -05:00 |
Tod Beardsley
|
25475ffc93
|
Msftidy fixes.
Whitespace on ie_execcommand_uaf, and skipping a known-weird caps check
on a particular software name.
|
2012-09-18 11:25:00 -05:00 |
sinn3r
|
5fbc4b836a
|
Add Microsoft advisory
|
2012-09-17 22:13:57 -05:00 |
Tod Beardsley
|
75bbd1c48d
|
Being slightly more clear on Browser Not Supported
With this and the rest of sinn3r's fixes, it looks like we can close the
Redmine bug.
[FixRM #7242]
|
2012-09-17 11:16:19 -05:00 |
sinn3r
|
d77ab9d8bd
|
Fix URIPATH and nil target
Allow random and '/' as URIPATh, also refuse serving the exploit
when the browser is unknown.
|
2012-09-17 10:54:12 -05:00 |
Tod Beardsley
|
48a46f3b94
|
Pack / Unpack should be V not L
Packing or unpacking to/from L, I, or S as pack types will cause
problems on big-endian builds of Metasloit, and are best avoided.
|
2012-09-17 09:52:43 -05:00 |
Tod Beardsley
|
d77efd587a
|
Merge remote branch 'wchen-r7/ie_0day_execcommand'
|
2012-09-17 08:48:22 -05:00 |
sinn3r
|
5eaefcf4c7
|
This is the right one, I promise
|
2012-09-17 08:41:25 -05:00 |
sinn3r
|
8f50a167bd
|
This is the right module
|
2012-09-17 08:36:04 -05:00 |
sinn3r
|
e43cae70a7
|
Add IE 0day exploiting the execcommand uaf
|
2012-09-17 08:28:33 -05:00 |
jvazquez-r7
|
9a83c7c338
|
changes according to egypt review
|
2012-09-14 18:47:50 +02:00 |
jvazquez-r7
|
eae571592c
|
Added rgod email
|
2012-09-14 17:45:16 +02:00 |
jvazquez-r7
|
a2649dc8d1
|
fix typo
|
2012-09-14 17:10:41 +02:00 |
jvazquez-r7
|
e27d5e2eb7
|
Description improved
|
2012-09-14 17:08:59 +02:00 |
jvazquez-r7
|
9c77c15cf5
|
Added module for osvdb 85087
|
2012-09-14 16:54:28 +02:00 |
Tod Beardsley
|
39f2cbfc3c
|
Older targets confirmed for CoolType SING
|
2012-09-12 16:51:51 -05:00 |
jvazquez-r7
|
61bf15114a
|
deregistering FILENAME option
|
2012-09-10 23:14:14 +02:00 |
jvazquez-r7
|
199fbaf33d
|
use a static filename
|
2012-09-10 23:08:21 +02:00 |
jvazquez-r7
|
cb975ce0a2
|
cleanup plus documentation for the maki template
|
2012-09-10 22:48:04 +02:00 |
jvazquez-r7
|
607c0f023a
|
added edb references
|
2012-09-10 17:30:31 +02:00 |
jvazquez-r7
|
b813e4e650
|
Added module for CVE-2009-1831
|
2012-09-10 16:46:16 +02:00 |
jvazquez-r7
|
caae54a7ca
|
added osvdb reference
|
2012-09-07 16:56:37 +02:00 |
jvazquez-r7
|
c572c20831
|
Description updated to explain conditions
|
2012-09-07 11:18:54 +02:00 |
sinn3r
|
86036737ca
|
Apparently this app has two different names
People may either call the app "ActiveFax", or "ActFax". Include
both names in there to allow the module to be more searchable.
|
2012-09-06 18:38:03 -05:00 |
jvazquez-r7
|
4985cb0982
|
Added module for ActFac SYSTEM Local bof
|
2012-09-07 00:45:08 +02:00 |
jvazquez-r7
|
b4113a2a38
|
hp_site_scope_uploadfileshandler is now multiplatform
|
2012-09-06 12:54:51 +02:00 |
jvazquez-r7
|
2f87af1c3a
|
add some checks while parsing the java serialization config file
|
2012-09-05 20:58:55 +02:00 |
jvazquez-r7
|
b2116e2394
|
cleanup, test, add on_new_session handler and osvdb references
|
2012-09-05 20:54:25 +02:00 |
jvazquez-r7
|
406202fc81
|
Added module for ZDI-12-174
|
2012-09-05 12:56:09 +02:00 |
sinn3r
|
783ffb13c2
|
Add Adobe security bulletin references
|
2012-09-04 00:07:53 -05:00 |
sinn3r
|
9d97dc8327
|
Add Metasploit blogs as references, because they're useful.
|
2012-09-03 15:57:27 -05:00 |
sinn3r
|
9ab62de637
|
Fix a spelling error
|
2012-09-03 01:44:02 -05:00 |
jvazquez-r7
|
943121dd61
|
Added module for CVE-2012-2611
|
2012-09-03 00:15:56 +02:00 |
sinn3r
|
d106a1150e
|
Be more clear that we dislike certain PDF templates
|
2012-08-31 14:07:58 -05:00 |
jvazquez-r7
|
f439f256b5
|
Debug line deleted on
|
2012-08-30 00:18:07 +02:00 |
sinn3r
|
c3159e369a
|
A lot gotcha
When res is nil, that condition can fall into the 'else' clause.
If that happens, we can trigger a bug when we try to read res.code.
|
2012-08-29 14:46:35 -05:00 |
jvazquez-r7
|
6a24e042f9
|
fixing indentation
|
2012-08-29 16:17:56 +02:00 |
jvazquez-r7
|
2ed712949e
|
Added check function
|
2012-08-29 16:12:11 +02:00 |
jvazquez-r7
|
72cb39925a
|
Added exploit for OSVDB 84821
|
2012-08-29 12:17:44 +02:00 |
sinn3r
|
8e56d4f2eb
|
This reference is too damn useful, must add
|
2012-08-25 16:05:58 -05:00 |
sinn3r
|
d51f8cad25
|
Change title and description
|
2012-08-24 15:39:56 -05:00 |
jvazquez-r7
|
e461d542ac
|
added Windows 2003 SP1 Spanish targets
|
2012-08-24 12:50:30 +02:00 |
jvazquez-r7
|
54ce7268ad
|
modules/exploits/windows/smb/ms08_067_netapi.rb
|
2012-08-24 11:30:23 +02:00 |
jvazquez-r7
|
1a60abc7a7
|
Added W2003 SP2 Spanish targets
|
2012-08-24 11:16:08 +02:00 |
jvazquez-r7
|
57c6385279
|
heap spray from flash works pretty well on ie9 too
|
2012-08-22 20:47:11 +02:00 |
jvazquez-r7
|
730c0e9368
|
added windows vista and w7 targets
|
2012-08-22 20:13:10 +02:00 |
sinn3r
|
22051c9c2c
|
Merge branch 'flash_exploit_r2' of https://github.com/wchen-r7/metasploit-framework into wchen-r7-flash_exploit_r2
|
2012-08-22 10:00:34 -05:00 |
sinn3r
|
1b6fe22359
|
Give proper credit to Craig plus additional references
Craig first found the buffer overflow. But Matt found a more
reliable way to exploit the flaw.
|
2012-08-21 22:48:15 -05:00 |
sinn3r
|
f715527423
|
Improve CVE-2012-1535
|
2012-08-21 19:58:21 -05:00 |