Joe Vennix
|
45da645717
|
Update ff svg exploit description to be more accurate.
|
2013-06-11 12:12:18 -05:00 |
Tod Beardsley
|
f58e279066
|
Cleanup on module names, descriptions.
|
2013-06-10 10:52:22 -05:00 |
jvazquez-r7
|
79bfdf3ca6
|
Add comment to explain the applet delivery methods
|
2013-06-07 14:20:21 -05:00 |
jvazquez-r7
|
641fd3c6ce
|
Add also the msf module
|
2013-06-07 13:39:19 -05:00 |
Steve Tornio
|
80f1e98952
|
added osvdb refs
|
2013-06-01 07:04:43 -05:00 |
Tod Beardsley
|
75d6c8079a
|
Spelling, whitespace
Please be sure to run msftidy.rb on new modules. Thanks!
|
2013-05-28 10:03:37 -05:00 |
sinn3r
|
81ad280107
|
Landing #1856 - CVE-2013-0758 Firefox <= 17.0.1 + Flash RCE
Chained exploit using CVE-2013-0758 and CVE-2013-0757
|
2013-05-23 12:21:10 -05:00 |
sinn3r
|
67861794f6
|
Fix automatic payload selection
|
2013-05-22 22:37:18 -05:00 |
sinn3r
|
23fe3146dc
|
Extra print_status I don't want
|
2013-05-22 14:38:30 -05:00 |
sinn3r
|
0e6576747a
|
Fix target selection probs, and swf path
|
2013-05-22 14:34:00 -05:00 |
Joe Vennix
|
aae4768563
|
Fix whitespace issues from msftidy.
|
2013-05-21 14:31:36 -05:00 |
Joe Vennix
|
eaeb10742a
|
Add some comments and clean some things up.
|
2013-05-21 14:01:14 -05:00 |
Joe Vennix
|
978aafcb16
|
Add DEBUG option, pass args to .encoded_exe().
|
2013-05-21 14:01:14 -05:00 |
Joe Vennix
|
ee8a97419c
|
Add some debug print calls to investigate Auto platform selection.
|
2013-05-21 14:01:13 -05:00 |
Joe Vennix
|
60fdf48535
|
Use renegerate_payload(cli, ...).
|
2013-05-21 14:01:13 -05:00 |
Joe Vennix
|
1a5c747bb9
|
Update description.
|
2013-05-15 23:52:51 -05:00 |
Joe Vennix
|
178a43a772
|
Whitespace tweaks and minor bug fix. Wrong payloads still run.
|
2013-05-15 23:47:04 -05:00 |
Joe Vennix
|
f4b6db8c49
|
Tweak whitespace.
|
2013-05-15 23:35:59 -05:00 |
Joe Vennix
|
a7d79e2a51
|
Oops, don't cache payload_filename.
|
2013-05-15 23:34:14 -05:00 |
Joe Vennix
|
4d5c4f68cb
|
Initial commit, works on three OSes, but automatic mode fails.
|
2013-05-15 23:32:02 -05:00 |
jvazquez-r7
|
bf0375f0e9
|
Fix @jlee-r7's feedback
|
2013-04-25 18:43:21 -05:00 |
jvazquez-r7
|
8eea476cb8
|
Build the jnlp uri when resource is available
|
2013-04-25 18:43:21 -05:00 |
jvazquez-r7
|
cc961977a2
|
Add bypass for click2play
|
2013-04-25 18:43:21 -05:00 |
jvazquez-r7
|
ece36c0610
|
Update references for the las Java exploit
|
2013-04-22 21:55:04 -05:00 |
jvazquez-r7
|
1365dfe68c
|
Add Oracle url
|
2013-04-20 01:43:14 -05:00 |
jvazquez-r7
|
b99fc06b6f
|
description updated
|
2013-04-20 01:43:14 -05:00 |
jvazquez-r7
|
19f2e72dbb
|
Added module for Java 7u17 sandboxy bypass
|
2013-04-20 01:43:13 -05:00 |
jvazquez-r7
|
1913d60d65
|
multibrowser support
|
2013-02-21 01:13:25 +01:00 |
jvazquez-r7
|
bf216cca5c
|
description and references updated
|
2013-02-20 18:14:53 +01:00 |
jvazquez-r7
|
d7b89a2228
|
added security level bypass
|
2013-02-20 17:50:47 +01:00 |
jvazquez-r7
|
d88ad80116
|
Added first version of cve-2013-0431
|
2013-02-20 16:39:53 +01:00 |
booboule
|
8bcf4a86ef
|
Update modules/exploits/multi/browser/java_jre17_method_handle.rb
Wrong reference type (URL instead of OSVDB)
|
2013-01-23 17:14:53 +01:00 |
jvazquez-r7
|
807bd6e88a
|
Merge branch 'java_jre17_glassfish_averagerangestatisticimpl' of https://github.com/jvazquez-r7/metasploit-framework into jvazquez-r7-java_jre17_glassfish_averagerangestatisticimpl
|
2013-01-22 15:33:39 +01:00 |
jvazquez-r7
|
3465aa00bd
|
title updated
|
2013-01-18 18:42:27 +01:00 |
jvazquez-r7
|
ef16a7fd24
|
cleanup
|
2013-01-17 21:45:13 +01:00 |
jvazquez-r7
|
670b4e8e06
|
cleanup
|
2013-01-17 21:39:41 +01:00 |
jvazquez-r7
|
78279a0397
|
Added new module for cve-2012-5076
|
2013-01-17 21:27:47 +01:00 |
jvazquez-r7
|
d0b9808fc7
|
Added module for CVE-2012-5088
|
2013-01-17 21:14:49 +01:00 |
joe
|
771fc07264
|
Change :vuln_test to :os_name for checking OS.
|
2013-01-14 02:17:40 -06:00 |
joe
|
efcdb1097c
|
Add BAP options to itms_overflow module.
|
2013-01-14 01:42:58 -06:00 |
sinn3r
|
4adf429c31
|
Adds one more ref
|
2013-01-11 01:33:26 -06:00 |
sinn3r
|
23ef8280be
|
Merge branch 'java_0day_refs' of github.com:jvazquez-r7/metasploit-framework into jvazquez-r7-java_0day_refs
Conflicts:
modules/exploits/multi/browser/java_jre17_jmxbean.rb
|
2013-01-11 01:33:11 -06:00 |
sinn3r
|
e709811c5a
|
CVE update
|
2013-01-10 19:51:04 -06:00 |
jvazquez-r7
|
2c05af721c
|
module also updated with refs
|
2013-01-11 00:57:05 +01:00 |
jvazquez-r7
|
ea000d6ee0
|
updated authors
|
2013-01-10 20:48:54 +01:00 |
jvazquez-r7
|
876d889d82
|
added exploit for j7u10 0day
|
2013-01-10 20:30:43 +01:00 |
Christian Mehlmauer
|
8f2dd8e2ce
|
msftidy: Remove $Revision$
|
2013-01-04 00:48:10 +01:00 |
Christian Mehlmauer
|
25aaf7a676
|
msftidy: Remove $Id$
|
2013-01-04 00:41:44 +01:00 |
sinn3r
|
f4aa84956c
|
Add technet reference
|
2012-11-17 01:24:12 -06:00 |
jvazquez-r7
|
8e7a748805
|
thins in place...
|
2012-11-11 20:19:20 +01:00 |