sinn3r
|
1ae779157d
|
Disable Nops so we don't get an ugly crash after getting a shell
|
2012-03-08 18:56:58 -06:00 |
Tod Beardsley
|
1e4d4a5ba0
|
Removing EncoderType from flash module
Also not very useful
|
2012-03-08 16:57:41 -06:00 |
Tod Beardsley
|
302a42a495
|
Fixing up print statements
Dropping the ROP prints since they're not all that useful.
|
2012-03-08 16:56:44 -06:00 |
Tod Beardsley
|
1396fc19bd
|
Fixup bad merge on flash mp4
|
2012-03-08 16:52:53 -06:00 |
sinn3r
|
cb04e47304
|
Attempt #2: there's no cli in get_payload
|
2012-03-08 16:47:49 -06:00 |
sinn3r
|
3563fe1b36
|
The encoder "issue" was just a misconfig on my side. Also there's no cli in get_payload.
|
2012-03-08 16:41:32 -06:00 |
sinn3r
|
fee2e1eff9
|
Minor spray size change
|
2012-03-08 16:19:51 -06:00 |
HD Moore
|
12395c719f
|
Remove debugging code
|
2012-03-08 16:16:42 -06:00 |
HD Moore
|
87274987c1
|
Remove the now obsolete text about SWF_PLAYER
|
2012-03-08 16:16:13 -06:00 |
sinn3r
|
181fdb7365
|
A small title change
|
2012-03-08 16:10:16 -06:00 |
HD Moore
|
1271368b6f
|
Redirect to a trailing slash to make sure relative resources load
properly
|
2012-03-08 15:37:06 -06:00 |
HD Moore
|
b0db18674c
|
Test out new player code
|
2012-03-08 15:05:12 -06:00 |
HD Moore
|
eb847a3dfb
|
Add a nicer prefix to the target selection message
|
2012-03-08 13:46:14 -06:00 |
sinn3r
|
edb3f19c12
|
A little more padding for Win Vista target
|
2012-03-08 12:04:04 -06:00 |
HD Moore
|
86fc45810b
|
Remove the resource during cleanup
|
2012-03-07 23:04:53 -06:00 |
HD Moore
|
b4e0daf3ca
|
Small tweaks to the adobe mp4 exploit
|
2012-03-07 22:53:47 -06:00 |
sinn3r
|
9ece7b08fc
|
Add vendor's advisory as a reference
|
2012-03-08 00:46:34 -06:00 |
sinn3r
|
5f92bff697
|
Make sure no encoder will break the exploit again
|
2012-03-08 00:44:57 -06:00 |
sinn3r
|
2e94b97c82
|
Fix description
|
2012-03-07 23:59:51 -06:00 |
sinn3r
|
0550b77522
|
Merge branch 'master' of github.com:rapid7/metasploit-framework
|
2012-03-07 20:04:04 -06:00 |
sinn3r
|
3b4ed13aee
|
Fix typo
|
2012-03-07 20:03:46 -06:00 |
Tod Beardsley
|
33460b6bf4
|
Fixups on the Adobe Flash exploit description
Massaged the lines about the phishing campagin use in the wild.
|
2012-03-07 19:37:49 -06:00 |
sinn3r
|
c76f43c066
|
Add CVE-2012-0754: Adobe Flash Player MP4 cprt overflow
|
2012-03-07 19:24:00 -06:00 |
Tod Beardsley
|
f97dc8dee7
|
Fix spelling of the IBM product iSeries
Was I-Series.
|
2012-03-07 15:24:15 -06:00 |
sinn3r
|
7dfba9c00d
|
Merge branch 'master' of github.com:rapid7/metasploit-framework
|
2012-03-07 14:51:39 -06:00 |
sinn3r
|
0ee7788028
|
Add a check to detect the vulnerable version of Sysax SSH
|
2012-03-07 14:51:21 -06:00 |
Tod Beardsley
|
ba2bf194fd
|
Fixes descriptions on new modules.
Fixing up grammar and removing some editorial verbiage.
|
2012-03-07 09:17:22 -06:00 |
James Lee
|
2b9acb61ad
|
Clean up some incosistent verbosity
Modules should use `vprint_*` instead of `print... if
datastore["VERBOSE"]` or similar constructs
|
2012-03-06 12:01:20 -07:00 |
HD Moore
|
99177e9d5e
|
Small commit to fix bad reference and old comment
|
2012-03-06 01:44:26 -06:00 |
James Lee
|
70162fde73
|
A few more author typos
|
2012-03-05 13:28:46 -07:00 |
sinn3r
|
4b1e67f94f
|
Add ROP target for Win2k3 SP1 and SP2
|
2012-03-04 17:18:34 -06:00 |
Steve Tornio
|
8f93a5abbb
|
add osvdb ref
|
2012-03-03 12:28:30 -06:00 |
sinn3r
|
fa916d863d
|
Add Sysax SSH buffer overflow exploit
|
2012-03-03 10:11:51 -06:00 |
sinn3r
|
67f788768d
|
Fix tabs
|
2012-03-01 22:31:08 -06:00 |
sinn3r
|
fd2d9ae0ea
|
Add MP4 file generating function. Update the description regarding exploit usage.
|
2012-03-01 22:24:35 -06:00 |
sinn3r
|
b1b2ec2c7d
|
Merge branch 'CVE-2008-5036_vlc_realtext' of https://github.com/juanvazquez/metasploit-framework into juanvazquez-CVE-2008-5036_vlc_realtext
|
2012-03-01 21:13:33 -06:00 |
sinn3r
|
8bad0033d3
|
Update description
|
2012-03-01 19:16:29 -06:00 |
sinn3r
|
0bc26c1665
|
Add CVE-2009-4656: DJ Studio .pls buffer overflow
|
2012-03-01 19:09:25 -06:00 |
juan
|
f1a6d8f535
|
Added exploit module for CVE-2008-5036
|
2012-03-01 23:06:40 +01:00 |
sinn3r
|
5a5e5eab95
|
Add msvcrt ROP target for IE8
|
2012-03-01 15:23:41 -06:00 |
Steve Tornio
|
2d802750e3
|
fix osvdb ref
|
2012-03-01 08:07:11 -06:00 |
Steve Tornio
|
256fee3626
|
add osvdb ref
|
2012-03-01 08:06:53 -06:00 |
Tod Beardsley
|
4369f73c7a
|
Msftidy fixes on new modules
Dropped a cryptic year reference from jducks' java module, found a
spurious space in thelightcosine's telnet module.
|
2012-02-29 10:42:43 -06:00 |
sinn3r
|
74cdb5dabc
|
It's a two-space tab, not one space. OMG.
|
2012-02-29 10:13:29 -06:00 |
sinn3r
|
986807e525
|
Add CVE-2012-0201 IBM Personal Communications .ws buffer overflow
|
2012-02-28 19:01:54 -06:00 |
sinn3r
|
5560087006
|
Add OSVDB 79438 Asus Net4Switch ActiveX Buffer Overflow
|
2012-02-28 18:58:28 -06:00 |
sinn3r
|
339fb8d266
|
eh, I mean Win2k3 SP0 to SP1
|
2012-02-23 17:33:49 -06:00 |
Joshua J. Drake
|
e262d7a7ff
|
Add CVE-2012-0500 Sun Java Web Start exploit
|
2012-02-23 13:30:45 -06:00 |
Steve Tornio
|
08fb03276f
|
add osvdb ref
|
2012-02-23 07:39:31 -06:00 |
sinn3r
|
144fa0dc0e
|
Comment what \x0b\x04 is for
|
2012-02-22 22:59:43 -06:00 |