Commit Graph

1895 Commits

Author SHA1 Message Date
jvazquez-r7 4e6b00fe31 Land #5473, @pedrib's exploit for Sysaid CVE-2015-2994
* sysaid rdslogs arbitrary file upload
2015-07-17 12:10:40 -05:00
jvazquez-r7 00adbd7f64 Fix quotes 2015-07-17 12:09:54 -05:00
jvazquez-r7 57c4a3387b Fix paths for windows and cleanup 2015-07-17 12:09:18 -05:00
jvazquez-r7 46ffb97c1c Land #5471, @pedrib's module for SysAid CVE-2015-2994
* sysaid arbitrary file upload
2015-07-17 11:27:22 -05:00
jvazquez-r7 309a86ec57 Do code cleanup 2015-07-17 11:26:54 -05:00
wchen-r7 f7ce6dcc9f We agreed to Normal 2015-07-11 02:07:18 -05:00
wchen-r7 0ff7333090 Lower the ranking for CVE-2015-5122
As an initial release we forgot to lower it.
2015-07-11 02:05:56 -05:00
wchen-r7 1289ec8863 authors 2015-07-11 01:38:21 -05:00
wchen-r7 6eabe5d48c Update description 2015-07-11 01:36:26 -05:00
wchen-r7 54fc712131 Update Win 8.1 checks 2015-07-11 01:33:23 -05:00
jvazquez-r7 6f0b9896e1 Update description 2015-07-11 00:56:18 -05:00
jvazquez-r7 115549ca75 Delete old check 2015-07-11 00:42:59 -05:00
jvazquez-r7 63005a3b92 Add module for flash CVE-2015-5122
* Just a fast port for the exploit leaked
* Just tested on win7sp1 / IE11
2015-07-11 00:28:55 -05:00
jvazquez-r7 5a045677bc Add waiting message 2015-07-10 18:48:46 -05:00
jvazquez-r7 8d52c265d9 Delete wfsdelay 2015-07-10 18:46:27 -05:00
jvazquez-r7 63e91fa50f Add reference 2015-07-10 18:46:06 -05:00
jvazquez-r7 677cd97cc2 Update information 2015-07-10 18:39:11 -05:00
jvazquez-r7 6c6a778218 Modify arkeia_agent_exec title 2015-07-10 18:38:25 -05:00
jvazquez-r7 4995728459 Modify arkeia_agent_exec ranking 2015-07-10 18:37:24 -05:00
jvazquez-r7 858f63cdbf Land #5693, @xistence VNC Keyboard EXEC module 2015-07-10 18:35:44 -05:00
jvazquez-r7 1326a26be5 Do code cleanup 2015-07-10 18:35:13 -05:00
jvazquez-r7 917282a1f1 Fix ranking 2015-07-10 17:49:15 -05:00
jvazquez-r7 bdd8b56336 fix comment 2015-07-10 16:28:20 -05:00
jvazquez-r7 95ae7d8cae Fix length limitation 2015-07-10 16:24:49 -05:00
jvazquez-r7 29a497a616 Read header as 6 bytes 2015-07-10 14:25:57 -05:00
jvazquez-r7 bed3257a3f Change default HTTP_DELAY 2015-07-10 12:50:26 -05:00
jvazquez-r7 c9d2ab58d3 Use HttpServer::HTML
* And make the exploit Aggressive
2015-07-10 12:48:21 -05:00
jvazquez-r7 e1192c75a9 Fix network communication on communicate
* Some protocol handling just to not read amounts of data blindly
2015-07-10 11:57:48 -05:00
jvazquez-r7 9ba515f185 Fix network communication on check
* Some protocol handling just to not read amounts of data blindly
2015-07-10 11:32:49 -05:00
jvazquez-r7 c70be64517 Fix version check 2015-07-10 10:57:55 -05:00
jvazquez-r7 34a6984c1d Fix variable name 2015-07-10 10:44:38 -05:00
jvazquez-r7 2c7cc83e38 Use single quotes 2015-07-10 10:34:47 -05:00
jvazquez-r7 f66cf91676 Fix metadata 2015-07-10 10:33:02 -05:00
xistence b916a9d267 VNC Keyboard Exec 2015-07-10 14:08:32 +07:00
xistence 52d41c8309 Western Digital Arkeia 'ARKFS_EXEC_CMD' <= v11.0.12 Remote Code Execution 2015-07-10 09:51:28 +07:00
wchen-r7 a3ec56c4cb Do it in on_request_exploit because it's too specific 2015-07-08 12:32:38 -05:00
wchen-r7 cefbdbb8d3 Avoid unreliable targets
If we can't garantee GreatRanking on specific targets, avoid them.
2015-07-08 12:12:53 -05:00
wchen-r7 6a33807d80 No Chrome for now 2015-07-07 15:56:58 -05:00
jvazquez-r7 f8b668e894 Update ranking and References 2015-07-07 15:43:02 -05:00
Tod Beardsley 116c3f0be1 Add CVE as a real ref, too 2015-07-07 14:46:44 -05:00
Tod Beardsley 3d630de353 Replace with a real CVE number 2015-07-07 14:44:12 -05:00
jvazquez-r7 829b08b2bf Complete authors list 2015-07-07 12:49:54 -05:00
wchen-r7 49effdf3d1 Update description 2015-07-07 12:46:02 -05:00
wchen-r7 d885420aff This changes the version requirement for adobe_flash_hacking_team_uaf.rb
Because it works for Win 8.1 + IE11 too
2015-07-07 12:42:56 -05:00
wchen-r7 d30688b116 Add more requirement info 2015-07-07 12:33:47 -05:00
jvazquez-r7 d9aacf2d41 Add module for hacking team flash exploit 2015-07-07 11:19:48 -05:00
William Vu 8892cbdd10 Fix some minor things 2015-07-02 14:32:16 -05:00
Tod Beardsley 95f19e6f1f Minor description edits for clarity
Edited modules/exploits/multi/browser/adobe_flash_nellymoser_bof.rb
first landed in #5642, Adobe Flash CVE-2015-3113 Nellymoser Audio
Decoding BOF

Edited modules/post/windows/gather/credentials/enum_laps.rb first landed
in #5590, @Meatballs1 adds MS LAPS Enum post mod

Edited modules/post/windows/gather/enum_ad_bitlocker.rb first landed in
Keys from AD
2015-07-02 13:51:37 -05:00
jvazquez-r7 3b9ba189f7 Add CVE-2015-3043 information 2015-07-01 19:56:35 -05:00
wchen-r7 93c74efb97 Add Ubuntu as a tested target 2015-07-01 18:43:22 -05:00