Commit Graph

395 Commits

Author SHA1 Message Date
jvazquez-r7 ecbddc6ef8 Play with memory al little bit better 2015-06-10 11:54:57 -05:00
wchen-r7 d622c782ef Land #5519, adobe_flash_uncompress_zlib_uninitialized in the flash renderer 2015-06-10 11:52:47 -05:00
jvazquez-r7 2b4fe96cfd Tweak Heap Spray 2015-06-10 10:56:24 -05:00
jvazquez-r7 a6fe383852 Use AS Exploiter 2015-06-10 09:32:52 -05:00
jvazquez-r7 64b486eeac Change filename 2015-06-10 09:12:52 -05:00
jvazquez-r7 d95a0f432d Update AS codE 2015-06-10 09:12:25 -05:00
jvazquez-r7 e5d6c9a3cb Make last code cleanup 2015-06-09 16:01:57 -05:00
jvazquez-r7 d9db45690f Delete debug messages 2015-06-09 15:47:59 -05:00
jvazquez-r7 cf8c6b510b Debug version working 2015-06-09 15:46:21 -05:00
jvazquez-r7 f4649cb3fb Delete old AS 2015-06-09 14:50:59 -05:00
jvazquez-r7 4f1ee3fcdf Really fix indentation 2015-06-09 12:42:32 -05:00
jvazquez-r7 5bab1cfc68 Fix indentation 2015-06-09 12:38:24 -05:00
jvazquez-r7 39851d277d Unset debug flag 2015-06-09 11:36:09 -05:00
jvazquez-r7 b7f0fad72f Modify CVE-2014-0569 to use the flash exploitation code 2015-06-09 11:31:39 -05:00
OJ b291d41b76 Quick hack to remove hard-coded offsets 2015-06-05 13:19:41 +10:00
jvazquez-r7 51d98e1008 Update AS code 2015-06-04 18:34:08 -05:00
jvazquez-r7 02181addc5 Update CVE-2014-0556 2015-06-04 18:23:50 -05:00
wchen-r7 23df66bf3a Land #5481, no powershell. exec shellcode from the renderer process. 2015-06-04 15:45:09 -05:00
jvazquez-r7 75454f05c4 Update AS source code 2015-06-04 12:12:49 -05:00
jvazquez-r7 80cb70cacf Add support for Windows 8.1/Firefox 2015-06-03 22:46:04 -05:00
jvazquez-r7 74117a7a52 Allow to execute payload from the flash renderer 2015-06-03 16:33:41 -05:00
OJ 455a3b6b9d Add butchered version of CVE-2015-1701 2015-06-03 21:48:23 +10:00
jvazquez-r7 e9714bfc82 Solve conflics 2015-05-27 23:22:00 -05:00
wchen-r7 e749733eb6 Land #5419, Fix Base64 decoding on ActionScript 2015-05-27 23:13:51 -05:00
jvazquez-r7 e5d42850c1 Add support for Linux to CVE-2015-0336 2015-05-27 17:05:10 -05:00
jvazquez-r7 801deeaddf Fix CVE-2015-0336 2015-05-27 15:42:06 -05:00
jvazquez-r7 bd1bdf22b5 Fix CVE-2015-0359 2015-05-26 17:27:20 -05:00
jvazquez-r7 19c7445d9d Fix CVE-2015-0336 2015-05-26 17:20:49 -05:00
jvazquez-r7 23d244b1fa Fix CVE-2015-0313 2015-05-26 16:11:44 -05:00
jvazquez-r7 5c8c5aef37 Fix CVE-2014-8440 2015-05-26 16:05:08 -05:00
jvazquez-r7 da362914e2 Fix indentation 2015-05-26 15:50:31 -05:00
jvazquez-r7 d78d04e070 Fix CVE-2014-0569 2015-05-26 15:49:22 -05:00
jvazquez-r7 e0a1fa4ef6 Fix indentation 2015-05-26 15:38:56 -05:00
jvazquez-r7 1742876757 Fix CVE-2014-0556 2015-05-26 15:30:39 -05:00
jvazquez-r7 a1538fc3ba Update AS code 2015-05-26 15:18:01 -05:00
jvazquez-r7 f35d7a85d3 Adjust numbers 2015-05-21 15:56:11 -05:00
jvazquez-r7 a8e9b0fb54 Update ActionScript 2015-05-21 14:58:38 -05:00
jvazquez-r7 51bb4b5a9b Add module for CVE-2015-0359 2015-05-07 17:00:00 -05:00
jvazquez-r7 582919acac Add module for CVE-2015-0336 2015-05-05 17:25:19 -05:00
jvazquez-r7 b07a864416 Fix as indentation 2015-04-29 19:01:11 -05:00
jvazquez-r7 dbba466b5b Add module for CVE-2014-8440 2015-04-29 17:52:04 -05:00
jvazquez-r7 28fac60c81 Add module for CVE-2015-0556 2015-04-15 14:08:16 -05:00
jvazquez-r7 91f5d0af5a Add module for CVE-2014-0569
* Adobe flash, Integer overflow on casi32
2015-04-09 19:37:26 -05:00
jvazquez-r7 11c6f3fdca Do reliable resolution of kernel32 2015-03-29 15:52:13 -05:00
jvazquez-r7 f84a46df63 Add module for CVE-2015-0313 2015-03-27 18:51:13 -05:00
jvazquez-r7 bb81107e51 Land #4927, @wchen-r7's exploit for Flash PCRE CVE-2015-0318 2015-03-13 23:58:05 -05:00
sinn3r 2a25e2b2e1 Update Main.as 2015-03-13 11:40:16 -05:00
sinn3r 0ee0a0da1c This seems to work 2015-03-13 04:43:06 -05:00
sinn3r 0c3329f69e Back on track 2015-03-12 15:26:55 -05:00
sinn3r 43b90610b1 Temp 2015-03-11 13:53:34 -05:00