Jacob Robles
2f202583be
Land #10335 , Add vlc_mkv exploit module
2018-10-10 11:49:11 -07:00
Jacob Robles
9762f921b8
Land #10738 , Add Zahir Enterprise 6 build 10b BOF
2018-10-04 09:03:40 -07:00
Jacob Robles
7a99fc7066
Land #10545 , foxit fix generated strings, update doc
2018-08-30 03:58:19 -07:00
Wei Chen
7b7c5a73c4
Land #10504 , add Foxit Reader UAF Module and Docs
2018-08-23 16:57:43 -07:00
Wei Chen
144923db3a
Land #10237 , Add Boxoft WAV to MP3 Converter exploit module
2018-07-02 12:03:05 -07:00
Brent Cook
b696665adc
Land #9478 , Improve Dup Scout BOF exploit
2018-02-08 10:25:39 -06:00
h00die
5457cec81c
Land #9493 updates to various docs
2018-02-06 23:33:58 -06:00
Jacob Robles
4fa68f29d9
Land #9457 , Dup Scout Enterprise v10.4.16 - Import Command Buffer Overflow
2018-02-01 11:23:26 -06:00
bwatters-r7
2ea9ab2625
Land #9416 , Sync Breeze Enterprise 9.5.16 Import Command buffer overflow
...
Merge branch 'land-9416' into upstream-master
2018-01-24 17:13:16 -06:00
Wei Chen
b99663fb6c
Bring #9282 up to date with upstream-master
2017-12-13 13:16:30 -06:00
Austin
900f7d6f69
docs on options
2017-12-07 14:47:40 -05:00
Austin
12425d962c
Rename office_dde_delivery to office_dde_delivery.md
2017-12-06 22:40:57 -05:00
Austin
1e4b707a60
MS Office DDE Documentation
2017-12-06 21:46:47 -05:00
Austin
14226c5f33
missing docs on options
...
Missed fixes on documentation
2017-12-04 20:58:36 -05:00
Austin
b7f17f5519
fix documentation
2017-12-04 16:41:27 -05:00
Austin
fcf2cfa134
Create office_ms17_11882.md
2017-11-21 14:45:56 -05:00
Brent Cook
da3ca9eb90
update some documentation
2017-08-03 17:09:44 -05:00
Yorick Koster
67dddd2402
Typo reported by @nixawk
2017-08-02 15:47:21 -05:00
Yorick Koster
3229320ba9
Code review feedback from @nixawk
2017-08-02 15:46:51 -05:00
Yorick Koster
565a3355be
CVE-2017-8464 LNK Remote Code Execution Vulnerability
...
This module exploits a vulnerability in the handling of Windows
Shortcut files (.LNK) that contain a dynamic icon, loaded from a
malicious DLL.
This vulnerability is a variant of MS15-020 (CVE-2015-0096). The
created LNK file is similar except in an additional
SpecialFolderDataBlock is included. The folder ID set in this
SpecialFolderDataBlock is set to the Control Panel. This is enought to
bypass the CPL whitelist. This bypass can be used to trick Windows into
loading an arbitrary DLL file.
2017-08-02 15:46:30 -05:00
wchen-r7
6029a9ee2b
Use a built-in HTA server and update doc
2017-04-24 16:04:27 -05:00
nixawk
0a085c4e83
add doc for exploit/windows/fileformat/office_word_hta
2017-04-18 03:26:10 -05:00
wchen-r7
34f074441d
Move doc
2017-02-16 12:33:05 -06:00
wchen-r7
e891063b74
Update doc
2017-02-03 14:29:29 -06:00
wchen-r7
5db1d958b0
Update doc
2017-02-03 14:08:28 -06:00
wchen-r7
6e692b1a1c
Update doc
2017-02-03 14:03:48 -06:00
wchen-r7
f3f774b9c7
Add demo
2017-02-03 12:01:51 -06:00
wchen-r7
92e065c21b
Update doc
2017-02-03 11:48:18 -06:00
wchen-r7
2457968a24
Update doc
2017-02-03 11:45:34 -06:00
wchen-r7
e9ba6fe7fd
Add doc
2017-02-02 20:42:46 -06:00