William Vu
9840951f0d
Land #12574 , Chrome CVE-2019-5825 exploit
2020-03-05 13:44:40 -06:00
William Vu
87b8182131
Land #12384 , Chrome CVE-2018-17463 exploit
2020-03-05 13:44:27 -06:00
Tim W
9f55e4163f
add documentation
2020-03-04 21:31:14 +08:00
Tim W
7f6f7fea3e
add osx as a target
2020-03-04 13:37:19 +08:00
Tim
9f56867f6c
Apply suggestions from code review
...
Co-Authored-By: adamgalway-r7 <54621924+adamgalway-r7@users.noreply.github.com >
2020-03-04 11:55:33 +07:00
Tim W
196c354ede
chrome 80 jscreate rce
2020-02-29 18:41:04 +08:00
Brent Cook
8489bcdfd9
This fixes broken links to the community.rapid7.com blog
...
Performed mechanically with sed, spot-checked that the new blog can consume these links.
2020-02-18 09:06:11 -06:00
Tim W
3a89bef6c4
improve description
2020-02-15 10:37:15 +08:00
Tim W
d95391b7f4
minor refactor
2020-02-15 06:10:52 +08:00
Tim W
55d5e55c5e
use simpler wasm code
2020-02-15 06:10:52 +08:00
Tim W
4b92403bba
fix?
2020-02-15 06:10:52 +08:00
Tim W
5420007dff
add support for osx and windows using wasm rwx region
2020-02-15 06:10:52 +08:00
Tim W
f6343f35aa
attempt to speed up pop_r9 gadget search
2020-02-15 06:10:52 +08:00
Tim W
bb4007747b
fix
2020-02-15 06:10:52 +08:00
Tim W
35dac6ea5f
no offsets
2020-02-15 06:10:52 +08:00
Tim W
59ed3e5948
dynamic offsets
2020-02-15 06:10:52 +08:00
Tim W
2efc381115
strcmp
2020-02-15 06:10:52 +08:00
Tim W
6fa086a0ab
add debugging option
2020-02-15 06:10:52 +08:00
Tim W
bbbb9565a4
fix win7
2020-02-15 06:10:52 +08:00
Tim W
d644f2d9c7
chrome 69.0.3497.100 --no-sandbox calc.exe
2020-02-15 06:10:52 +08:00
Tim W
d6c3e4ad56
fix wasm finder to match pr description
2020-02-15 01:09:27 +08:00
Tim W
94287c94ff
fix discovery and references
2020-02-15 00:39:48 +08:00
Tim
0e076d286e
Update modules/exploits/multi/browser/chrome_array_map.rb
...
Co-Authored-By: bcoles <bcoles@gmail.com >
2019-12-13 12:47:21 +07:00
Tim W
46d759eca9
add support for Chrome 68.0.3440.84
2019-11-15 17:42:16 +08:00
Tim W
4ef54518ed
add support for OSX and 69.0.3497.100
2019-11-15 16:12:49 +08:00
Tim W
04dd5162cf
Add CVE-2019-5825, Chrome 73 1-day Array.map --no-sandbox exploit
2019-11-13 22:26:44 +08:00
suzu991154
cdce03f42d
fix_os_check
2019-06-03 16:17:23 +09:00
suzu991154
0a6f1d5538
Add support for Windows 10(10240) to CVE-2015-5122
2019-06-01 14:44:30 +09:00
Erin Bleiweiss
eb17d9b198
Refactor AKA references for modules
2018-08-31 16:56:05 -05:00
Aaron Soto
c4bca03fea
Land #9908 , msfd_rce_remote and msfd_rce_browser
2018-04-27 18:54:17 -05:00
Brent Cook
27bd2a4a9f
workaround Y2k38 issues in java certificate generation
2018-03-01 08:41:28 -06:00
Pearce Barry
6051a1a1c1
Land #8910 , Use meta redirect instead of JS redirect in 2 modules
2017-09-01 13:50:02 -05:00
james
49173818fd
Addresses #8674
...
This type of redirection will work without javascript being enabled.
Modules:
multi/browser/firefox_xpi_bootstrapped_addon
multi/browser/itms_overflow
More info on the meta element:
https://developer.mozilla.org/en-US/docs/Web/HTML/Element/meta
2017-08-30 23:16:46 -05:00
h00die
a40429158f
40% done
2017-08-28 20:17:58 -04:00
Brent Cook
6300758c46
use https for metaploit.com links
2017-07-24 06:26:21 -07:00
g0tmi1k
b8d80d87f1
Remove last newline after class - Make @wvu-r7 happy
2017-07-19 11:19:49 +01:00
g0tmi1k
4720d1a31e
OCD fixes - Spaces
2017-07-14 08:46:59 +01:00
g0tmi1k
fd843f364b
Removed extra lines
2017-07-14 08:17:16 +01:00
Brent Cook
3bda361544
add old hackingteam leak name
2017-07-07 00:52:11 -05:00
William Vu
64452de06d
Fix msf/core and self.class msftidy warnings
...
Also fixed rex requires.
2017-05-03 15:44:51 -05:00
wchen-r7
72caeaa72f
Fix redirect url
2016-07-24 15:49:03 -05:00
RageLtMan
14c9569afa
2013-1710 - Use header VHOST info for redirection
...
When this exploit is hit by hostname, the HTTP request contains
a Host header field which does not match the IP-based redirection.
Update the module to check request headers for host information,
and fallback to the prior behavior if none exists.
Tested in conjunction with #6611 DNS spoofer - works great, see
issue #7098 for details.
2016-07-17 04:50:54 -04:00
Brent Cook
b08d1ad8d8
Revert "Land #6812 , remove broken OSVDB references"
...
This reverts commit 2b016e0216 , reversing
changes made to 7b1d9596c7 .
2016-07-15 12:00:31 -05:00
wchen-r7
4a95e675ae
Rm empty references
2016-04-24 11:46:08 -05:00
wchen-r7
816bc91e45
Resolve #6807 , remove all OSVDB references.
...
OSVDB is no longer a vulnerability database, therefore all the
references linked to it are invalid.
Resolve #6807
2016-04-23 12:32:34 -05:00
Christian Mehlmauer
3123175ac7
use MetasploitModule as a class name
2016-03-08 14:02:44 +01:00
Brent Cook
f703fa21d6
Revert "change Metasploit3 class names"
...
This reverts commit 666ae14259 .
2016-03-07 13:19:55 -06:00
Christian Mehlmauer
666ae14259
change Metasploit3 class names
2016-03-07 09:56:58 +01:00
Jon Hart
27a6aa0be1
Fix current msftidy warnings about PACKETSTORM vs URL
2015-12-24 09:05:02 -08:00
Brent Cook
7444f24721
update whitespace / syntax for java_calendar_deserialize
2015-12-23 15:42:27 -06:00