xaitax
adae68d288
Update winrar_cve_2023_38831.rb
2023-09-07 22:01:49 +02:00
Alex
4d2277faa3
Update modules/exploits/windows/fileformat/winrar_cve_2023_38831.rb
...
Co-authored-by: Brendan <bwatters@rapid7.com >
2023-09-07 21:46:24 +02:00
Alex
51d80b626f
Update modules/exploits/windows/fileformat/winrar_cve_2023_38831.rb
...
Co-authored-by: Brendan <bwatters@rapid7.com >
2023-09-07 21:46:16 +02:00
Alex
8b40f56fd7
Update modules/exploits/windows/fileformat/winrar_cve_2023_38831.rb
...
Co-authored-by: Brendan <bwatters@rapid7.com >
2023-09-07 21:46:09 +02:00
Alex
cc78156b8c
Update modules/exploits/windows/fileformat/winrar_cve_2023_38831.rb
...
Co-authored-by: Brendan <bwatters@rapid7.com >
2023-09-07 21:46:00 +02:00
xaitax
28785eb8a1
Remove payload space
2023-09-07 19:59:31 +02:00
xaitax
ac91516cc9
Update winrar_cve_2023_38831.rb
2023-09-04 20:25:20 +02:00
xaitax
b0fa4cc266
Update winrar_cve_2023_38831.rb
2023-09-04 19:54:43 +02:00
xaitax
d5f355d8de
WinRAR 6.22 (CVE-2023-38831)
2023-09-04 18:56:22 +02:00
bwatters
0965233591
Remove debug print
2023-08-17 08:48:42 -05:00
bwatters
2f9e5cd332
Update info hash
2023-08-04 11:16:38 -05:00
bwatters
e8456a6625
Add documentation and fix null filename catch
2023-08-03 18:30:20 -05:00
bwatters
d3b7bcd676
Working
2023-08-03 13:23:41 -05:00
bwatters
59e3760509
First attempt at CVE-2023-34634
2023-08-03 10:58:07 -05:00
cgranleese-r7
8e0a909b18
Fixes incorrect usage of pack/unpack directives
2023-07-19 11:39:00 +01:00
cgranleese-r7
e004be00fe
Converted to Active Support
2023-04-05 16:53:01 +01:00
cgranleese-r7
c3a7da54d5
reduces code duplication
2023-04-04 10:27:11 +01:00
cgranleese-r7
40e6917b7f
tests passing
2023-04-04 10:24:09 +01:00
adfoster-r7
d04c8e1bce
Update broken secunia references
2023-03-23 10:43:57 +00:00
bcoles
431804ef15
Fix typos: Replace 'the the' with 'the'
2022-12-04 17:41:24 +11:00
Spencer McIntyre
68eae1664e
Tweak the follina docs
2022-08-25 17:10:59 -04:00
bwatters
683132242c
fix up the uri_space maths
2022-08-25 16:08:26 -05:00
bwatters
115955591b
Fix up the Unicode coversions and update docs
2022-08-17 13:21:56 -05:00
bwatters
ef9f5ca463
Add rtf support to cve-2022-30190 AKA Follina
2022-06-30 17:30:06 -05:00
bwatters
c751ef46c9
Land #16635 , Add 0-day MSWord RCE #Follina CVE-2022-30190
...
Merge branch 'land-16635' into upstream-master
2022-06-06 14:41:31 -05:00
RAMELLA Sébastien
3ab06461af
fix. second review
2022-06-02 00:58:20 +04:00
RAMELLA Sébastien
dd1814903c
fix. SRVHOST default value
2022-06-02 00:07:15 +04:00
RAMELLA Sébastien
8c19a02835
fix. first review
2022-06-01 20:15:08 +04:00
RAMELLA Sébastien
7f89e92da3
add more informations about
2022-05-31 00:12:30 +04:00
RAMELLA Sébastien
97921b4ed9
fix chmod 644
2022-05-30 22:11:35 +04:00
RAMELLA Sébastien
dfc226cf5f
add. Supposed 0day MSWord RCE
2022-05-30 21:23:18 +04:00
Brendan Coles
94ed9ae28b
Modules: Prefer CVE references over cve.mitre.org URL references
2022-04-19 20:42:23 +00:00
sjanusz
bbf9e3163a
Fix file reads on Windows for binary files
2022-03-21 12:47:39 +00:00
h00die
d5ba1afbec
fix URLs not resolving
...
fix URLs not resolving
add csv export to references
fix URLs not resolving
pdf not pd
missed a url change
remove extra recirectedfrom fields
remove extra file
fix ovftool url accidental replacement
2022-02-16 17:22:40 -06:00
Spencer McIntyre
2f6710e02e
Remove the Not_Hosted target
...
It's not currently working and Metasploit should just handle everything
2021-12-08 17:22:44 -05:00
bwatters
852230c739
Fix bug brought in by importing Msf::Post::File
...
Split out javascript to a file and deobfuscate it
Update documentation for new targets
Fix other small suggestions
2021-12-08 10:36:27 -06:00
bwatters
14064ff3f9
Update module description and remove extra module.
2021-11-29 15:23:02 -06:00
bwatters
2a68b9ae9f
Add targets to track http server status
2021-11-17 07:54:49 -06:00
RAMELLA Sébastien
38973510f7
update modules (auxiliary and exploit)
2021-11-09 15:18:58 +04:00
surya
2f00ccfbc8
Linted Stuff
2021-10-08 03:04:34 +05:30
surya
59ffc44dbc
Cleared a minor error
2021-10-08 02:57:13 +05:30
surya
d1e3a104db
Merged branches
2021-10-08 02:55:39 +05:30
surya
4d4b51d158
=> Added .gitignore
...
=> Added Deobfuscated HTML Payload
=> Removed Extra Author Credits
=> Made SRVHOST AND SRVPORT MANDATORY
=> generate_uri replaced with builtin get_uri
2021-10-08 02:50:27 +05:30
suryasaradhi
cbbb83073f
Added Authors
2021-10-05 21:03:45 +05:30
surya
48388133dd
Msftidy up code v2
2021-10-05 02:33:36 +05:30
surya
171f114ce2
Msftidy up code v1
2021-10-05 02:10:33 +05:30
surya
3461c7aef6
Added module for CVE-2021-40444
2021-10-05 01:44:34 +05:30
adfoster-r7
4a9a15e638
Run Rubocop layout rules on modules
2021-08-27 17:19:43 +01:00
Brendan Coles
a1c316c679
msftidy: Fix exploit module checks for author and stack buffer overflow
2021-02-13 04:10:13 +00:00
dwelch-r7
1617b3ec9b
Use zeitwerk for lib/msf/core folder
2020-12-07 10:31:45 +00:00