Commit Graph

2578 Commits

Author SHA1 Message Date
Pedro Ribeiro 3181d76e63 Update sysaid_auth_file_upload.rb 2015-06-20 16:53:33 +01:00
William Vu 2587595a92 Land #5556, vprint_status fix 2015-06-19 11:24:54 -05:00
William Vu b994801172 Revert auto tab replacement 2015-06-19 11:22:40 -05:00
wchen-r7 15985e8b4f Land #5559, Adobe Flash Player ShaderJob Buffer Overflow 2015-06-19 10:38:05 -05:00
Tod Beardsley afcb016814 Minor description fixups.
Edited modules/exploits/multi/browser/adobe_flash_pixel_bender_bof.rb
first landed in #5524, adobe_flash_pixel_bender_bof in flash renderer .
Removed ASCII bullets since those rarely render correctly.

Edited modules/exploits/unix/webapp/wp_frontend_editor_file_upload.rb
first landed in #5252, @espreto's module for WordPress Front-end Editor
File Upload Vuln . Fixed up some language usage, camel-cased "WordPress."
2015-06-18 13:25:39 -05:00
jvazquez-r7 de1542e589 Add module for CVE-2015-3090 2015-06-18 12:36:14 -05:00
g0tmi1k ce9481d2b7 Inconstancy - If datastore['VERBOSE'] vs vprint 2015-06-18 09:27:01 +01:00
jvazquez-r7 8ed13b1d1b Add linux support for CVE-2014-0515 2015-06-11 16:18:50 -05:00
Tod Beardsley 0d979f61ae Minor fixups on newish modules 2015-06-10 11:09:42 -05:00
jvazquez-r7 318f67fcda update descriptions 2015-06-05 09:01:20 -05:00
wchen-r7 71a8487091 Correct Flash version in the module description
There is no 11.2.202.404, mang.
2015-06-04 23:46:41 -05:00
jvazquez-r7 02181addc5 Update CVE-2014-0556 2015-06-04 18:23:50 -05:00
wchen-r7 23df66bf3a Land #5481, no powershell. exec shellcode from the renderer process. 2015-06-04 15:45:09 -05:00
jvazquez-r7 ab68d8429b Add more targets 2015-06-04 12:11:53 -05:00
jvazquez-r7 80cb70cacf Add support for Windows 8.1/Firefox 2015-06-03 22:46:04 -05:00
jvazquez-r7 74117a7a52 Allow to execute payload from the flash renderer 2015-06-03 16:33:41 -05:00
Pedro Ribeiro d5b33a0074 Update sysaid_rdslogs_fle_upload.rb 2015-06-03 22:01:13 +01:00
Pedro Ribeiro 37827be10f Update sysaid_auth_file_upload.rb 2015-06-03 22:00:44 +01:00
Pedro Ribeiro 62993c35d3 Create sysaid_rdslogs_fle_upload.rb 2015-06-03 21:45:14 +01:00
Pedro Ribeiro 193b7bcd2e Create sysaid_auth_file_upload.rb 2015-06-03 21:44:02 +01:00
wchen-r7 2a260f0689 Update description 2015-05-28 15:18:05 -05:00
jvazquez-r7 e9714bfc82 Solve conflics 2015-05-27 23:22:00 -05:00
Spencer McIntyre 24b4dacec5 Land #5408, @g0tmi1k fixes verbiage and whitespace 2015-05-27 21:02:02 -04:00
jvazquez-r7 e5d42850c1 Add support for Linux to CVE-2015-0336 2015-05-27 17:05:10 -05:00
Tod Beardsley 95b5ff6bea Minor fixups on recent modules.
Edited modules/auxiliary/admin/http/netgear_soap_password_extractor.rb
first landed in #5301, @m-1-k-3's aux module to extract passwords from
Netgear soap interfaces

Edited modules/auxiliary/scanner/http/influxdb_enum.rb first landed in

Edited modules/auxiliary/scanner/http/title.rb first landed in #5333,
HTML Title Grabber

Edited modules/exploits/multi/browser/adobe_flash_uncompress_zlib_uaf.rb
first landed in #5401, multi-platform CVE-2015-0311 - Flash uncompress()
UAF

Edited modules/exploits/unix/webapp/wp_revslider_upload_execute.rb first
landed in #5290, Wordpress RevSlider Module
2015-05-26 17:00:10 -05:00
jvazquez-r7 b9f9647ab1 Use all the BES power 2015-05-21 14:06:41 -05:00
jvazquez-r7 aa919da84d Add the multiplatform exploit 2015-05-20 18:57:59 -05:00
jvazquez-r7 2882374582 Land #5276, @lanjelot fixes #4243 and improves java_jdwp_debugger 2015-05-15 11:12:10 -05:00
jvazquez-r7 a46975f1f0 Fix read_reply to use get_once correctly 2015-05-15 11:11:25 -05:00
jvazquez-r7 0fb21af247 Verify deletion at on_new_session moment 2015-05-11 18:56:18 -05:00
William Vu 71518ef613 Land #5303, metasploit-payloads Java binaries 2015-05-07 22:39:54 -05:00
William Vu 2f2169af90 Use single quotes consistently 2015-05-07 22:39:36 -05:00
Brent Cook a066105a86 prefer reading directly with MetasploitPayloads where possible 2015-05-07 16:59:02 -05:00
William Vu b8c7161819 Fix up NameError'd payload_exe 2015-05-06 11:34:05 -05:00
Brent Cook a0c806c213 Update java meterpreter and payload references to use metasploit-payloads 2015-05-05 15:01:00 -05:00
joev db999d2c62 Remove ff 31-34 exploit from autopwn, requires interaction. 2015-05-03 10:42:21 -05:00
jvazquez-r7 a531ad9ec2 Land #5096, @pedrib's exploit for Novell ZCM CVE-2015-0779 2015-05-01 14:35:28 -05:00
jvazquez-r7 0ff33572a7 Fix waiting loop 2015-05-01 14:34:43 -05:00
jvazquez-r7 645f239d94 Change module filename 2015-05-01 14:18:34 -05:00
jvazquez-r7 11a3f59b0b Return false if there isn't a positive answer 2015-05-01 14:06:57 -05:00
jvazquez-r7 093c2e3ace Do minor style cleanup 2015-05-01 13:56:48 -05:00
jvazquez-r7 d38adef5cc Make TOMCAT_PATH optional 2015-05-01 13:54:39 -05:00
jvazquez-r7 d2a7d83f71 Avoid long sleep times 2015-05-01 13:51:52 -05:00
jvazquez-r7 8fcf0c558d Use single quotes 2015-05-01 13:20:27 -05:00
lanjelot 5ab9f01eee Use byte[] so it works even if Base64 unavailable 2015-04-30 12:46:14 +10:00
lanjelot 15bb4d1ea4 Fix #4243, regression introduced by commit 6e80481384 2015-04-30 12:42:39 +10:00
jvazquez-r7 ab94f15a60 Take care of modules using the 'DEBUG' option 2015-04-21 12:13:40 -05:00
jvazquez-r7 4224008709 Delete print_debug/vprint_debug 2015-04-21 11:14:03 -05:00
jvazquez-r7 4f59abe842 Land #5203, @Meatballs1 fixes #5199 by using the correct namespace
* Fixes web_delivery
2015-04-20 11:20:48 -05:00
Meatballs eb1c01417a Bogus : 2015-04-20 11:00:26 +01:00