Commit Graph

6361 Commits

Author SHA1 Message Date
Wei Chen 39b8dce342 Update the description 2019-05-16 16:25:23 -05:00
Wei Chen 27554cf19a Add the completed version of oats_weblogic_console.rb 2019-05-16 16:24:31 -05:00
7echSec 328b4fa860 Addressing Syntax error 2019-05-16 21:06:47 +05:30
7echSec c947cd76f6 Removed register_advanced_options
Added 'Powershell::wrap_double_quotes' => false in DefaultOptions.
2019-05-16 14:19:52 +05:30
PierrickV 94f904311b Fix broken links mostly to Microsoft website 2019-05-16 09:50:19 +02:00
7echSec 053ceed171 Regression fix: Disabling wrap_double_quotes
This client side exploit stopped working in current MSF throws an error in client browser.As per the analysis its because of Powershell::wrap_double_quotes=true. 
I have just Added "Powershell::wrap_double_quotes"  as advance option to override Datastore value.
2019-05-16 12:39:42 +05:30
rwincey 7c30422166 Documentation 2019-05-16 00:02:37 -04:00
rwincey 1c05958892 Exploit 2019-05-15 23:36:57 -04:00
h00die 3a305fd7fa add version numbers to ams_hndlrsvc 2019-05-10 16:42:09 -04:00
h00die f50c89ca0a ams_hndlrsvc updates 2019-05-10 16:38:22 -04:00
h00die 185b740d87 msftidy 2019-05-10 15:26:17 -04:00
Wei Chen 03dbb2fc2c Work in progress for oats_weblogic_console 2019-05-10 13:27:08 -05:00
Wei Chen 310d931bf5 Land #11816, Add CVE-2019-5786 : Chrome 72.0.3626.119 on Windows 7 x86 2019-05-08 11:21:40 -05:00
Wei Chen 923d8b8b2e Fix uri with get_resource 2019-05-08 11:20:36 -05:00
Tim W 39969e71fa Initial commit of CVE-2019-5786 2019-05-06 17:05:00 +08:00
Jacob Robles 68ffdf0ddc Land #11641, Add AIS RCE 2019-04-29 13:52:58 -05:00
p0w1 f63a2a6e58 add badchar 2019-04-25 18:24:26 +02:00
@shellfail 985285d880 Update modules/exploits/windows/misc/ais_esel_server_rce.rb
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
2019-04-25 18:05:50 +02:00
@shellfail 98b054b8a4 Update modules/exploits/windows/misc/ais_esel_server_rce.rb
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
2019-04-25 18:05:43 +02:00
@shellfail 537f55e9da Update modules/exploits/windows/misc/ais_esel_server_rce.rb
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
2019-04-25 18:05:32 +02:00
@shellfail 9206bd404d Update modules/exploits/windows/misc/ais_esel_server_rce.rb
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
2019-04-25 18:05:22 +02:00
@shellfail 46f4473ade Update modules/exploits/windows/misc/ais_esel_server_rce.rb
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
2019-04-25 18:05:14 +02:00
bcoles 5d4de2c715 Update modules/exploits/windows/misc/ais_esel_server_rce.rb
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
2019-04-25 18:04:56 +02:00
bcoles 77dce74789 Update modules/exploits/windows/misc/ais_esel_server_rce.rb
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
2019-04-25 18:04:04 +02:00
@shellfail 38e95dd311 Update modules/exploits/windows/misc/ais_esel_server_rce.rb
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
2019-04-25 18:02:56 +02:00
@shellfail 0b09759621 Update modules/exploits/windows/misc/ais_esel_server_rce.rb
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
2019-04-25 18:02:44 +02:00
@shellfail 4e85f5f731 Update modules/exploits/windows/misc/ais_esel_server_rce.rb
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
2019-04-25 18:02:30 +02:00
@shellfail 59e4df759a Update modules/exploits/windows/misc/ais_esel_server_rce.rb
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
2019-04-25 18:01:38 +02:00
@shellfail 376925e619 Update modules/exploits/windows/misc/ais_esel_server_rce.rb
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
2019-04-25 18:01:27 +02:00
@shellfail cecc9e210c Update modules/exploits/windows/misc/ais_esel_server_rce.rb
Co-Authored-By: p0w1 <39155277+p0w1@users.noreply.github.com>
2019-04-25 18:01:15 +02:00
Jacob Robles 39aae367a5 Land #11765, Update NUUO mixin, move code to Rex 2019-04-25 09:35:47 -05:00
Brent Cook 2242c1f758 prefer File.binread for reading binary file contents 2019-04-24 05:43:28 -05:00
Jacob Robles 0174d1dd7e Update nuuo_cms_sqli
Use updated nuuo mixin/rex
2019-04-23 06:29:51 -05:00
Jacob Robles 5686319271 Update nuuo_cms_fu
Use the updated mixin/rex implementation
2019-04-23 06:28:57 -05:00
Imran E. Dawoodjee 521277691e Allow users to add other files for realism.
Update docs to reflect this change.
2019-04-18 04:07:46 +08:00
Imran E. Dawoodjee 6676dcb2ec Allow user to use a file of their own choosing.
Updates to documentation and some comments in the module.
2019-04-17 00:18:27 +08:00
Imran E. Dawoodjee 6c798221fb Module for CVE-2018-20250 and documentation 2019-04-16 02:21:25 +08:00
asoto-r7 b32d116e9a Land #11669, exploit/windows/fileformat/microsoft_windows_contact 2019-04-10 17:18:33 -05:00
asoto-r7 94785dabbb Renamed module from 'microsoft_windows_contact_remote_code_execution' to 'microsoft_windows_contact' 2019-04-10 17:17:50 -05:00
asoto-r7 62bf38d530 Simplified user options, recreated CONTACT template from a clean file 2019-04-10 17:14:04 -05:00
BrennerLittle e733d225b6 microsoft_windows_contact_remote_code_execution 2019-03-31 11:12:09 -05:00
William Vu 496f270b30 Update use_single_quotes to wrap_double_quotes 2019-03-29 18:14:56 -05:00
h00die ff5b790028 apache tika exploit msftidy 2019-03-28 22:07:01 -04:00
h00die dc33998374 apache tika exploit 2019-03-28 22:05:05 -04:00
p0w1 1e0ab44033 Fix Space EOL 2019-03-28 10:56:59 +01:00
p0w1 0470e76f45 Fix Code Style 2019-03-28 10:56:12 +01:00
p0w1 430c2f42b1 Fix Code Style 2019-03-28 10:03:11 +01:00
p0w1 19324ee6b9 Fix EOL 2019-03-27 17:13:54 +01:00
p0w1 6175870c55 Style Fixes 2019-03-27 17:12:08 +01:00
p0w1 b95b8988ad Remove Space at EOL 2019-03-27 11:20:53 +01:00