Jacob Robles
966f0782c1
Land #11843 , Update MSB references
2019-05-23 09:43:32 -05:00
William Vu
0df0003ca5
Land #11842 , Powershell::wrap_double_quotes fix
2019-05-16 11:28:17 -07:00
Wei Chen
5e24e4cbcf
Land #11816 , Add CVE-2019-5786 : Chrome 72.0.3626.119 on Windows 7 x86
2019-05-08 09:24:04 -07:00
Green-m
f8126235bb
Land #11042 , calm down msftidy.
2018-11-29 18:09:13 -08:00
Wei Chen
7d04ebcf5f
Land #9642 , support version 5 for GetGo Download Manager bof exploit
2018-10-15 13:49:36 -07:00
Brendan Coles
874ed3ca72
Land #10733 , Fix typo in module documentation
2018-10-02 11:46:31 -07:00
William Vu
2ee6a49a27
Land #10649 , https://seclists.org references
2018-09-17 15:09:39 -07:00
Adam Cammack
2269f7eb43
Land #10594 , Remove trailing space from CVE number
2018-08-29 14:39:19 -05:00
Wei Chen
465dceb182
Land #10299 , Add 88 CVEs to various auxiliary and exploit modules
2018-07-12 16:28:05 -07:00
Wei Chen
409ae22a7e
Land #9633 , Exodus Wallet Remote Code Execution
...
Land #9633
2018-03-27 15:44:49 -07:00
Patrick Webster
2f6da89674
Change author name to nick.
2017-11-09 03:00:24 +11:00
Kent Gruber
7cd532c384
Change targetr to target to fix small typo bug on one failure
...
The target object seems to have a typo where it is referred to as
“targetr” which I’d guess isn’t exactly what we’d like to do in this
case. So, I’ve changed that to “target” in order to work.
So, I’ve simply fixed that small typo.
2017-10-19 19:55:58 -04:00
Brent Cook
9d2e8b1e4d
Land #8003 , Evasions for delivering nops/shellcode into memory
2017-10-05 16:44:36 -05:00
Pearce Barry
8de6fa79c1
Tweakz, yo.
2017-09-22 18:49:09 -05:00
h00die
30f833f684
80 pages left
2017-09-13 22:03:34 -04:00
Tod Beardsley
cfbd3c1615
Fix spelling of Honeywell
2017-09-11 13:02:18 -05:00
h00die
7339658ba9
224 pages of spelling issues left
2017-09-09 09:52:08 -04:00
h00die
0910c482a9
35 pages of spelling done
2017-09-08 22:19:55 -04:00
Brent Cook
6300758c46
use https for metaploit.com links
2017-07-24 06:26:21 -07:00
Brent Cook
80d18fae6a
update example modules to have zero violations
2017-07-24 06:15:54 -07:00
Brent Cook
838b066abe
Merge branch 'master' into land-8716
2017-07-24 05:51:44 -07:00
g0tmi1k
b8d80d87f1
Remove last newline after class - Make @wvu-r7 happy
2017-07-19 11:19:49 +01:00
g0tmi1k
3d4feffc62
OCD - Spaces & headings
2017-07-19 11:04:15 +01:00
g0tmi1k
4720d1a31e
OCD fixes - Spaces
2017-07-14 08:46:59 +01:00
g0tmi1k
fd843f364b
Removed extra lines
2017-07-14 08:17:16 +01:00
g0tmi1k
424522147e
OCD fixes - Start of *.rb files
2017-07-13 23:53:59 +01:00
Brent Cook
3b248c78f3
resurrect old example modules, integrate into module tree
2017-06-22 11:36:35 -05:00
William Vu
64452de06d
Fix msf/core and self.class msftidy warnings
...
Also fixed rex requires.
2017-05-03 15:44:51 -05:00
Jeff Tang
67086966ac
Avoid calling unescape on nops directly
...
Using an intermediate variable will avoid triggering signatures
2017-02-23 18:19:16 -05:00
wchen-r7
5d0b532b20
Fix #8002 , Use post/windows/manage/priv_migrate instead of migrate -f
...
Because migrate -f uses a meterpreter script, and meterpreter scripts
are deprecated, we should be replacing with a post module
Fix #8002
2017-02-23 17:04:36 -06:00
Jeff Tang
8ce10ac591
Avoid String.fromCharCode which gets detected
2017-02-22 14:13:18 -05:00
wchen-r7
3c6fa12aca
Update firefox_smil_uaf to use BrowserExploitServer
2017-01-31 16:04:16 -06:00
William Webb
dd60fc3598
move cisco_webex_ext to exploits/windows/browser/
2017-01-27 16:59:20 -06:00
wchen-r7
04648888b3
Be conservative and do NormalRanking
2017-01-23 11:55:30 -06:00
William Webb
0eb5342d83
disclosure date
2017-01-20 11:57:50 -06:00
William Webb
d8f04ccc18
address msftidy complaints
2017-01-20 11:56:11 -06:00
William Webb
fb74b2d8f3
initial commit of finished product
2017-01-20 11:01:36 -06:00
OJ
1d617ae389
Implement first pass of architecture/platform refactor
2016-10-28 07:16:05 +10:00
wchen-r7
bc425b0378
Update samsung_security_manager_put
...
This patch improves the following
* Stage 1 XSS/JS attack to use the body.onload callback
* Better timing for FF
2016-09-22 12:02:49 -05:00
Steven Seeley
230903562f
Add Samsung Security Manager 1.5 ActiveMQ Broker exploit
2016-08-05 15:19:22 -05:00
wchen-r7
e16c57ed07
Lower rank
2016-08-03 14:02:47 -05:00
wchen-r7
96dbf627ae
Remove unwanted metadata for HttpServer
2016-08-03 13:55:58 -05:00
William Webb
be4f55aa2f
forgot to update ranking
2016-08-02 13:30:12 -05:00
William Webb
ba0da52274
msftidy cleanup
2016-08-01 13:36:05 -05:00
William Webb
21e6211e8d
add exploit for cve-2016-0189
2016-08-01 13:26:35 -05:00
Brent Cook
b08d1ad8d8
Revert "Land #6812 , remove broken OSVDB references"
...
This reverts commit 2b016e0216 , reversing
changes made to 7b1d9596c7 .
2016-07-15 12:00:31 -05:00
wchen-r7
4a95e675ae
Rm empty references
2016-04-24 11:46:08 -05:00
wchen-r7
816bc91e45
Resolve #6807 , remove all OSVDB references.
...
OSVDB is no longer a vulnerability database, therefore all the
references linked to it are invalid.
Resolve #6807
2016-04-23 12:32:34 -05:00
wchen-r7
31279291c2
Resolve merge conflict for ie_unsafe_scripting.rb
2016-03-17 14:42:36 -05:00
wchen-r7
b1b68294bb
Update class name
2016-03-17 14:41:23 -05:00