dwelch-r7
|
49a6b1b257
|
Remove requires that sneaked in while the PR was up
|
2020-12-07 11:02:10 +00:00 |
|
dwelch-r7
|
1617b3ec9b
|
Use zeitwerk for lib/msf/core folder
|
2020-12-07 10:31:45 +00:00 |
|
Grant Willcox
|
849dbeca5c
|
Fix up bad merge commit
|
2020-10-15 11:53:39 -05:00 |
|
Tim W
|
87104a7236
|
Update docs and make them msftidy_docs.rb compliant
|
2020-10-15 10:59:46 -05:00 |
|
Grant Willcox
|
f2899186e4
|
Add in first round of initial updates to fix review comments
|
2020-10-15 10:59:40 -05:00 |
|
Tim W
|
dcc322436b
|
Update documentation files and module description to more accurately describe what the cause of the LPE bug for CVE-2019-1458 is. also apply RuboCop edits.
|
2020-10-15 10:58:58 -05:00 |
|
Tim W
|
c38064b022
|
Apply rubocop edits and update documentation
|
2020-10-15 10:58:38 -05:00 |
|
Tim W
|
a3772d43d4
|
set InitialAutoRunScript to post/windows/manage/priv_migrate
|
2020-10-15 10:58:08 -05:00 |
|
Tim W
|
12c5f4f916
|
CVE-2019-1458 chrome sandbox escape initial commit
|
2020-10-15 10:57:46 -05:00 |
|
Alan Foster
|
30809787c4
|
Convert disclosure dates to iso8601
|
2020-10-02 21:00:37 +01:00 |
|
William Vu
|
9840951f0d
|
Land #12574, Chrome CVE-2019-5825 exploit
|
2020-03-05 13:44:40 -06:00 |
|
William Vu
|
87b8182131
|
Land #12384, Chrome CVE-2018-17463 exploit
|
2020-03-05 13:44:27 -06:00 |
|
Tim W
|
9f55e4163f
|
add documentation
|
2020-03-04 21:31:14 +08:00 |
|
Tim W
|
7f6f7fea3e
|
add osx as a target
|
2020-03-04 13:37:19 +08:00 |
|
Tim
|
9f56867f6c
|
Apply suggestions from code review
Co-Authored-By: adamgalway-r7 <54621924+adamgalway-r7@users.noreply.github.com>
|
2020-03-04 11:55:33 +07:00 |
|
Tim W
|
196c354ede
|
chrome 80 jscreate rce
|
2020-02-29 18:41:04 +08:00 |
|
Brent Cook
|
8489bcdfd9
|
This fixes broken links to the community.rapid7.com blog
Performed mechanically with sed, spot-checked that the new blog can consume these links.
|
2020-02-18 09:06:11 -06:00 |
|
Tim W
|
3a89bef6c4
|
improve description
|
2020-02-15 10:37:15 +08:00 |
|
Tim W
|
d95391b7f4
|
minor refactor
|
2020-02-15 06:10:52 +08:00 |
|
Tim W
|
55d5e55c5e
|
use simpler wasm code
|
2020-02-15 06:10:52 +08:00 |
|
Tim W
|
4b92403bba
|
fix?
|
2020-02-15 06:10:52 +08:00 |
|
Tim W
|
5420007dff
|
add support for osx and windows using wasm rwx region
|
2020-02-15 06:10:52 +08:00 |
|
Tim W
|
f6343f35aa
|
attempt to speed up pop_r9 gadget search
|
2020-02-15 06:10:52 +08:00 |
|
Tim W
|
bb4007747b
|
fix
|
2020-02-15 06:10:52 +08:00 |
|
Tim W
|
35dac6ea5f
|
no offsets
|
2020-02-15 06:10:52 +08:00 |
|
Tim W
|
59ed3e5948
|
dynamic offsets
|
2020-02-15 06:10:52 +08:00 |
|
Tim W
|
2efc381115
|
strcmp
|
2020-02-15 06:10:52 +08:00 |
|
Tim W
|
6fa086a0ab
|
add debugging option
|
2020-02-15 06:10:52 +08:00 |
|
Tim W
|
bbbb9565a4
|
fix win7
|
2020-02-15 06:10:52 +08:00 |
|
Tim W
|
d644f2d9c7
|
chrome 69.0.3497.100 --no-sandbox calc.exe
|
2020-02-15 06:10:52 +08:00 |
|
Tim W
|
d6c3e4ad56
|
fix wasm finder to match pr description
|
2020-02-15 01:09:27 +08:00 |
|
Tim W
|
94287c94ff
|
fix discovery and references
|
2020-02-15 00:39:48 +08:00 |
|
Tim
|
0e076d286e
|
Update modules/exploits/multi/browser/chrome_array_map.rb
Co-Authored-By: bcoles <bcoles@gmail.com>
|
2019-12-13 12:47:21 +07:00 |
|
Tim W
|
46d759eca9
|
add support for Chrome 68.0.3440.84
|
2019-11-15 17:42:16 +08:00 |
|
Tim W
|
4ef54518ed
|
add support for OSX and 69.0.3497.100
|
2019-11-15 16:12:49 +08:00 |
|
Tim W
|
04dd5162cf
|
Add CVE-2019-5825, Chrome 73 1-day Array.map --no-sandbox exploit
|
2019-11-13 22:26:44 +08:00 |
|
suzu991154
|
cdce03f42d
|
fix_os_check
|
2019-06-03 16:17:23 +09:00 |
|
suzu991154
|
0a6f1d5538
|
Add support for Windows 10(10240) to CVE-2015-5122
|
2019-06-01 14:44:30 +09:00 |
|
Erin Bleiweiss
|
eb17d9b198
|
Refactor AKA references for modules
|
2018-08-31 16:56:05 -05:00 |
|
Aaron Soto
|
c4bca03fea
|
Land #9908, msfd_rce_remote and msfd_rce_browser
|
2018-04-27 18:54:17 -05:00 |
|
Brent Cook
|
27bd2a4a9f
|
workaround Y2k38 issues in java certificate generation
|
2018-03-01 08:41:28 -06:00 |
|
Pearce Barry
|
6051a1a1c1
|
Land #8910, Use meta redirect instead of JS redirect in 2 modules
|
2017-09-01 13:50:02 -05:00 |
|
james
|
49173818fd
|
Addresses #8674
This type of redirection will work without javascript being enabled.
Modules:
multi/browser/firefox_xpi_bootstrapped_addon
multi/browser/itms_overflow
More info on the meta element:
https://developer.mozilla.org/en-US/docs/Web/HTML/Element/meta
|
2017-08-30 23:16:46 -05:00 |
|
h00die
|
a40429158f
|
40% done
|
2017-08-28 20:17:58 -04:00 |
|
Brent Cook
|
6300758c46
|
use https for metaploit.com links
|
2017-07-24 06:26:21 -07:00 |
|
g0tmi1k
|
b8d80d87f1
|
Remove last newline after class - Make @wvu-r7 happy
|
2017-07-19 11:19:49 +01:00 |
|
g0tmi1k
|
4720d1a31e
|
OCD fixes - Spaces
|
2017-07-14 08:46:59 +01:00 |
|
g0tmi1k
|
fd843f364b
|
Removed extra lines
|
2017-07-14 08:17:16 +01:00 |
|
Brent Cook
|
3bda361544
|
add old hackingteam leak name
|
2017-07-07 00:52:11 -05:00 |
|
William Vu
|
64452de06d
|
Fix msf/core and self.class msftidy warnings
Also fixed rex requires.
|
2017-05-03 15:44:51 -05:00 |
|