Tod Beardsley
|
e7d7302644
|
Dropping the umlaut, sacrificing accuracy for usability. Can't guarantee a viewer has a Unicode-capable terminal.
|
2012-01-09 11:22:44 -06:00 |
sinn3r
|
03a39f7fe8
|
Whitespace cleanup, also change print_status usage when verbose
|
2012-01-09 02:21:39 -06:00 |
sinn3r
|
2f9d563067
|
Update reference
|
2012-01-09 02:14:29 -06:00 |
sinn3r
|
243dbe50f0
|
Correct author name. Unfortunately not all editors can print unicode correctly.
|
2012-01-07 15:18:25 -06:00 |
sinn3r
|
4e858aba89
|
Add CVE-2012-0262 Op5 welcome.php Remote Code Execution
|
2012-01-07 15:13:45 -06:00 |
sinn3r
|
4645c1c2b9
|
Add CVE-2012-0261 Op5 license.php Remote Code Execution
|
2012-01-07 15:12:49 -06:00 |
David Maloney
|
9cf2af6a94
|
Adds exploit/windows/htt/xampp_webdav_upload_php
This exploit abuses weak default passwords on XAMPP
for windows to uplaod a php payload and execute it.
Fixes #2170
|
2012-01-06 12:00:14 -08:00 |
HD Moore
|
8315709fb6
|
Correct typo and set the disclosure date
|
2012-01-04 19:46:56 -06:00 |
sinn3r
|
8cced0a91e
|
Add CVE-2011-2462 Adobe Reader U3D exploit
|
2012-01-04 03:49:49 -06:00 |
Joshua J. Drake
|
958ffe6e1d
|
Fix stack trace from unknown agents
|
2012-01-02 03:41:49 -06:00 |
Steve Tornio
|
7bfdc9eff4
|
add osvdb ref
|
2012-01-01 09:10:10 -06:00 |
sinn3r
|
d9db03dba6
|
Add CoCSoft StreamDown buffer overflow (Feature #6168; no CVE or OSVDB ref)
|
2011-12-30 10:16:29 -06:00 |
sinn3r
|
b202c29153
|
Correct e-mail format
|
2011-12-29 11:27:10 -06:00 |
sinn3r
|
d484e18300
|
Add e-mail for tecr0c
|
2011-12-29 11:14:15 -06:00 |
sinn3r
|
9972f42953
|
Add e-mail for mr_me for consistency
|
2011-12-29 11:01:38 -06:00 |
sinn3r
|
b5b2c57b9f
|
Correct e-mail format
|
2011-12-29 10:57:00 -06:00 |
sinn3r
|
a330a5c63a
|
Add e-mail for Brandon
|
2011-12-29 10:53:39 -06:00 |
Steve Tornio
|
778d396bc6
|
add osvdb ref
|
2011-12-29 07:54:15 -06:00 |
Steve Tornio
|
6d72dbb609
|
add osvdb ref
|
2011-12-29 07:54:01 -06:00 |
Steve Tornio
|
a00dad32fe
|
Merge branch 'master' of git://github.com/rapid7/metasploit-framework
|
2011-12-29 07:50:33 -06:00 |
Steve Tornio
|
27d1601028
|
add osvdb ref
|
2011-12-29 07:49:16 -06:00 |
Tod Beardsley
|
0e3370f1fe
|
Grammar and spelling on splunk and oracle exploits
|
2011-12-28 13:42:56 -06:00 |
HD Moore
|
5dc647a125
|
Make it clear that this exploit is for RHEL 3 (White Box 3 uses the same
packages)
|
2011-12-28 02:02:03 -06:00 |
HD Moore
|
5d67bd2a5e
|
Phew. Exhaustive test of all i386 FreeBSD versions complete
|
2011-12-28 01:38:55 -06:00 |
HD Moore
|
1ff0cb2eef
|
More testing - looks like 5.5 is not exploitable, at least not the same
way
|
2011-12-28 01:30:25 -06:00 |
HD Moore
|
e071944a1a
|
Allow ff in payloads but double them back up
|
2011-12-28 00:04:24 -06:00 |
HD Moore
|
edb9843ef9
|
Add Linux exploit with one sample target (Whitebox Linux 3)
|
2011-12-28 00:00:10 -06:00 |
HD Moore
|
79103074cb
|
Add credit for Dan's advice
|
2011-12-27 23:39:02 -06:00 |
HD Moore
|
f9224d6010
|
Adds basic coverage for CVE-2011-4862. Ported from Jaime Penalba
Estebanez's code, mostly written by Brandon Perry, exploit method (jmp
edx) by Dan Rosenberg, and general mangling/targets by hdm.
|
2011-12-27 23:37:30 -06:00 |
sinn3r
|
101eba6aa5
|
Add CVE-2011-3587 Plone/Zope Remote CMD Injection (Feature #6151)
|
2011-12-27 00:59:26 -06:00 |
Steve Tornio
|
4215ef3ae1
|
add osvdb ref
|
2011-12-24 06:54:39 -06:00 |
steponequit
|
69570dada6
|
Add CVE-2008-2161 OpenTFTP SP 1.4 Buffer Overflow by steponequit
|
2011-12-23 16:28:36 -06:00 |
steponequit
|
84c6739921
|
added initial opentftp 1.4 windows exploit
|
2011-12-23 11:27:11 -06:00 |
sinn3r
|
41697440c7
|
Add Oracle Job Scheduler Command Execution (CreateProcessA) - Feature #6079
|
2011-12-23 01:22:39 -06:00 |
sinn3r
|
b5b24a1fbf
|
Add a check. I decided not to try to login in the check function in order to remain non-malicious.
However, this decision doesn't represent how modules should write their own check.
|
2011-12-22 13:16:54 -06:00 |
sinn3r
|
262fe75e0a
|
Add CVE-2011-4642 - Splunk Remote Code Execution (Feature #6129)
|
2011-12-22 13:04:37 -06:00 |
sinn3r
|
baaa1f6c82
|
Add US-Cert references to all these SCADA modules. The refers are based on this list:
http://www.scadahacker.com/resources/msf-scada.html
|
2011-12-20 14:07:29 -06:00 |
sinn3r
|
b58097a2a7
|
Remove junk() because it's never used
|
2011-12-17 01:28:07 -06:00 |
sinn3r
|
fae80f8d49
|
typo
|
2011-12-16 11:10:46 -06:00 |
Steve Tornio
|
1712f2aa22
|
add osvdb ref
|
2011-12-14 07:23:11 -06:00 |
Steve Tornio
|
85caabbf5d
|
add osvdb ref
|
2011-12-14 07:19:34 -06:00 |
HD Moore
|
86b3409d47
|
Actually return
|
2011-12-13 20:01:13 -06:00 |
HD Moore
|
cb456337a0
|
Handle invalid http responses better, see #6113
|
2011-12-13 19:54:10 -06:00 |
sinn3r
|
fea4bfb85c
|
Repair dead milw0rm link to exploit-db
|
2011-12-13 16:13:53 -06:00 |
sinn3r
|
c1a4c4e584
|
Repair dead milw0rm link to exploit-db
|
2011-12-13 16:13:34 -06:00 |
sinn3r
|
acef9de711
|
Repair dead milw0rm link to exploit-db
|
2011-12-13 16:13:15 -06:00 |
sinn3r
|
e7ab48693c
|
Repair dead milw0rm link to exploit-db
|
2011-12-13 16:12:57 -06:00 |
sinn3r
|
94b736c76c
|
Repair dead milw0rm link to exploit-db
|
2011-12-13 16:12:38 -06:00 |
sinn3r
|
97b74101fb
|
Repair dead milw0rm link to exploit-db
|
2011-12-13 16:12:11 -06:00 |
sinn3r
|
d246bfa4da
|
Credit Luigi Auriemma for the original discovery/poc, not Celil
|
2011-12-13 15:20:26 -06:00 |