metasploit-framework/data/exploits
bwatters-r7 29f4870fa0
Land #10101, Add glibc 'realpath()' Privilege Escalation exploit
2018-06-12 16:41:07 -05:00
..
CVE-2008-6508
CVE-2010-0232 Remove genericity, x64 and renamed stuff 2013-11-14 12:22:53 +10:00
CVE-2010-0842
CVE-2010-1240 Add an R in /Info for the trailer dictionary to make it readable 2014-11-05 22:28:37 -06:00
CVE-2011-2882
CVE-2011-3400
CVE-2012-0013
CVE-2012-1535 Add Main.swf from 593363c 2013-07-29 21:53:40 -05:00
CVE-2012-2516
CVE-2012-4681
CVE-2013-0109 Final changes before PR 2013-12-15 01:12:49 +00:00
CVE-2013-0634 Beautify and fix both ruby an AS 2014-04-17 23:32:29 -05:00
CVE-2013-2465 Change directory names 2013-08-15 22:52:42 -05:00
CVE-2013-3906 Initial commit of CVE-2013-3906 2013-11-19 23:10:32 -06:00
CVE-2013-5045 Use powershell instead of mshta 2014-06-03 09:01:56 -05:00
CVE-2013-5331 Add module for CVE-2013-5331 2014-04-27 10:40:46 -05:00
CVE-2014-0038 Cleanup linux/local/recvmmsg_priv_esc module 2018-05-24 17:56:07 +00:00
CVE-2014-0257 Do test 2014-06-03 09:52:01 -05:00
CVE-2014-0322 Add module for CVE-2014-0322 2014-04-15 17:55:24 -05:00
CVE-2014-0497 Add module for CVE-2014-0497 2014-05-03 20:04:46 -05:00
CVE-2014-0515 Delete debug 2015-06-11 17:39:36 -05:00
CVE-2014-0556 Update CVE-2014-0556 2015-06-04 18:23:50 -05:00
CVE-2014-0569 Unset debug flag 2015-06-09 11:36:09 -05:00
CVE-2014-4113 Use PDWORD_PTR and DWORD_PTR 2014-10-31 17:35:50 -05:00
CVE-2014-4114/template Add ppsx template 2014-10-16 17:55:22 -05:00
CVE-2014-4404 Change paths, add makefile and compile 2014-11-30 21:06:11 -06:00
CVE-2014-6352/template_run_as_admin Add module for CVE-2014-6352 2014-11-12 01:10:49 -06:00
CVE-2014-8440 Make last code cleanup 2015-06-09 16:01:57 -05:00
CVE-2015-0016 Update DLL 2015-08-26 15:15:32 -05:00
CVE-2015-0311 Add more targets 2015-06-04 12:11:53 -05:00
CVE-2015-0313 Allow more search space 2015-06-10 12:26:53 -05:00
CVE-2015-0318 This seems to work 2015-03-13 04:43:06 -05:00
CVE-2015-0336 Add support for Windows 8.1/Firefox 2015-06-03 22:46:04 -05:00
CVE-2015-0359 Disable debug 2015-06-10 14:07:18 -05:00
CVE-2015-1130 Add Rootpipe exploit 2015-04-10 11:22:00 -05:00
CVE-2015-1328 revamped 2016-10-15 20:57:31 -04:00
CVE-2015-1701 Update exploit binaries for ms15-051 2015-06-25 09:33:15 +10:00
CVE-2015-2426 Clean template code 2015-09-12 13:43:05 -05:00
CVE-2015-3090 Add module for CVE-2015-3090 2015-06-18 12:36:14 -05:00
CVE-2015-3105 Add module for CVE-2015-3105 2015-06-25 13:35:01 -05:00
CVE-2015-3113 Add module for CVE-2015-3113 2015-07-01 13:13:57 -05:00
CVE-2015-3673 Remove sleep(), clean up WritableDir usage. 2015-07-05 18:59:00 -05:00
CVE-2015-5119 Update swf 2015-07-15 18:35:41 -05:00
CVE-2015-5122 Improve adobe_flash_opaque_background_uaf 2015-07-16 14:56:32 -05:00
CVE-2015-8103 Add Jenkins CLI Java serialization exploit module 2015-12-11 14:57:10 -06:00
CVE-2015-8660 working module 2016-10-04 23:21:53 -04:00
CVE-2016-0040 Re-add compiled Binary 2018-05-03 15:50:15 -05:00
CVE-2016-0099 Fix whitespace 2016-07-27 12:37:14 -05:00
CVE-2016-4557 cve-2016-4557 2016-09-29 05:23:12 -04:00
CVE-2016-4655 add binary 2018-05-30 18:02:17 +08:00
CVE-2016-4997 binary drops work! 2016-09-24 21:31:00 -04:00
CVE-2016-8655 Add AF_PACKET chocobo_root Privilege Escalation exploit 2018-05-07 07:11:07 +00:00
CVE-2017-0358 move sploit.c out to data folder 2017-03-31 20:51:33 -04:00
CVE-2017-7494 Rename payloads with os+libc, shrink array inits 2017-05-27 19:50:31 -05:00
CVE-2017-8291 Quick Ghostscript module based on the public PoC 2017-04-28 09:56:52 -05:00
CVE-2017-16666 Add xplico remote code execution 2017-11-14 09:30:57 +03:00
CVE-2017-17562 Resolve a bug in reverse_tcp and segfaults across payloads 2017-12-29 14:18:55 -06:00
R7_2015_17 Add missing stream.raw for hp_sitescope_dns_tool 2016-03-15 11:06:06 -05:00
badodt Add files via upload 2018-05-24 09:45:38 +01:00
batik_svg
capcom_sys_exec Add LPE exploit module for the capcom driver flaw 2016-09-27 22:37:45 +10:00
capture/http File.exists? must die 2016-04-21 00:47:07 -04:00
cve-2010-0094
cve-2010-0840/vuln
cve-2010-3563
cve-2010-3904 Add Reliable Datagram Sockets (RDS) Privilege Escalation 2018-05-03 12:51:21 +00:00
cve-2010-4452
cve-2011-3544
cve-2012-5076
cve-2012-5076_2
cve-2012-5088
cve-2013-0074 Small fix to interface 2013-11-22 17:02:08 -06:00
cve-2013-0422
cve-2013-0431
cve-2013-1300 Use signed binary 2014-05-02 14:45:14 +01:00
cve-2013-1488
cve-2013-1493
cve-2013-2460
cve-2013-3660 ppr_flatten_rec update, RDI submodule, and refactor 2013-11-27 20:44:18 +10:00
cve-2013-3881 Add binary compiled on vs2013 2014-02-10 13:52:27 -06:00
cve-2014-1610 Use msf branded djvu 2014-02-01 00:37:28 +00:00
cve-2015-1318 Use cross-compiled exploit 2018-01-13 05:44:42 +00:00
cve-2015-3315 Add ABRT raceabrt Privilege Escalation module 2018-01-16 14:52:33 +00:00
cve-2016-0051 refactor ms16-016 code 2016-07-05 20:50:43 -05:00
cve-2016-0189 add exploit for cve-2016-0189 2016-08-01 13:26:35 -05:00
cve-2016-6415 CVE-2016-6415 Cisco - sendpacket.raw 2016-09-29 22:24:55 -05:00
cve-2017-7308 Recompile pre-compiled exploit executable (stripped, no DEBUG) 2018-05-17 09:43:07 +00:00
cve-2017-8464 recompile binaries 2017-11-08 09:33:48 -06:00
cve-2018-1000001 Add glibc 'realpath()' Privilege Escalation exploit 2018-05-26 21:25:59 +00:00
docx
edb-35948 Call CollectGarbage 2015-02-09 14:44:31 -06:00
firefox_smil_uaf initial commit of finished product 2017-01-20 11:01:36 -06:00
imagemagick Add PS template 2016-10-13 17:40:15 -05:00
java_signed_applet
jre7u17
mssql
mysql mysql UDF now multi 2017-11-03 05:26:05 -04:00
ntapphelpcachecontrol Use RDL 2015-01-09 19:02:08 -06:00
office_word_macro Update office_word_macro exploit to support template injection 2017-05-25 15:53:45 -05:00
openoffice_document_macro Completed version of openoffice_document_macro 2017-02-08 16:29:40 -06:00
osx Add auto-accept to osx/enum_keychain. 2015-09-07 21:17:49 -05:00
pfsense_clickjacking Added local copies of the static content 2017-12-02 10:14:14 +01:00
php Revert "Land #6812, remove broken OSVDB references" 2016-07-15 12:00:31 -05:00
poison_ivy_c2 Modifications based on suggestions by @wchen-r7 2016-06-08 01:17:15 +02:00
postgres
powershell new changes 2015-05-19 16:18:06 +01:00
psnuffle unknow to unknown 2017-08-18 11:33:48 -04:00
pxexploit
roothelper Add Libuser roothelper Privilege Escalation exploit 2018-04-23 17:49:11 +00:00
scripthost_uac_bypass Initial working scripthost bypass uac 2015-08-23 20:16:15 +01:00
splunk
tpwn Move tpwn source to external/source/exploits 2015-08-17 18:27:47 -05:00
uxss Add some common UXSS scripts. 2014-09-09 02:31:27 -05:00
wifi
CVE-2007-3314.dat
CVE-2008-0320.doc
CVE-2008-5353.jar
CVE-2008-5499.swf
CVE-2009-3867.jar
CVE-2009-3869.jar
CVE-2010-0480.avi
CVE-2010-0822.xls
CVE-2010-1297.swf
CVE-2010-3275.amv
CVE-2010-3654.swf
CVE-2011-0105.xlb
CVE-2011-0257.mov
CVE-2011-0609.swf
CVE-2011-0611.swf
CVE-2011-2110.swf
CVE-2012-0507.jar
CVE-2012-0754.swf
CVE-2012-0779.swf
CVE-2012-1723.jar
CVE-2013-2171.bin
CVE-2013-6282.so add module binary 2016-12-22 03:25:10 -06:00
CVE-2014-0980.pui Implemented Recommended Changes 2015-03-17 16:39:56 -04:00
CVE-2014-3153.so add binary for futex_requeue 2017-01-11 13:25:30 -06:00
QTJavaExploit.class
cve-2010-2883.ttf
cve-2013-0758.swf
cve-2014-1761.rtf MS14-017 Word RTF listoverridecount memory corruption 2014-04-08 14:44:20 -04:00
cve-2017-0199.rtf Fix rtf info author 2017-04-14 21:16:39 -05:00
exec_payload.msi
google_proxystylesheet.xml
iceweasel_macosx.icns
iphone_libtiff.bin
modicon_ladder.apx
mp4player.as
mp4player.fla
mp4player.swf
msfJavaToolkit.jar
office_ole_multiple_dll_hijack.ppsx Moved PPSX to data/exploits folder 2016-11-08 16:04:46 +01:00
pricedown.eot
runcalc.hlp
s4u_persistence.xml
shockwave_rcsl.dir