sinn3r
|
64f4777407
|
Land #4091 - Xerox DLM injection
|
2014-10-30 22:15:16 -05:00 |
|
sinn3r
|
b7a1722b46
|
Pass msftidy, more descriptive name and description
|
2014-10-30 22:14:18 -05:00 |
|
Jon Hart
|
1a37a6638c
|
Fix splunk_upload_app_exec to work on new installs. Style
|
2014-10-30 18:28:56 -07:00 |
|
Jon Hart
|
55f245f20f
|
Merge #3507 into local, recently updated branch of master for landing
|
2014-10-30 17:28:20 -07:00 |
|
jvazquez-r7
|
6574db5dbb
|
Fix the 64 bits code
|
2014-10-30 17:01:59 -05:00 |
|
Deral Heiland
|
64a59e805c
|
Fix a simple typo
|
2014-10-29 12:40:24 -04:00 |
|
Deral Heiland
|
1bf1be0e46
|
Updated to module based feedback from wchen-r7
|
2014-10-29 11:42:07 -04:00 |
|
William Vu
|
71a6ec8b12
|
Land #4093, cups_bash_env_exec CVE-2014-6278
|
2014-10-28 12:47:51 -05:00 |
|
Brendan Coles
|
57baf0f393
|
Add support for CVE-2014-6278
|
2014-10-28 17:10:19 +00:00 |
|
William Vu
|
3de5c43cf4
|
Land #4050, CUPS Shellshock
Bashbleeded!!!!!!!!!!!
|
2014-10-28 11:59:31 -05:00 |
|
Brendan Coles
|
78b199fe72
|
Remove CVE-2014-6278
|
2014-10-28 16:18:24 +00:00 |
|
Joe Vennix
|
c6bbc5bccf
|
Merge branch 'landing-4055' into upstream-master
|
2014-10-28 11:18:20 -05:00 |
|
Deral Heiland
|
9021e4dae6
|
Xerox Workcentre firmware injection exploit
|
2014-10-28 11:15:43 -04:00 |
|
jvazquez-r7
|
5e0993d756
|
Add OJ as author
|
2014-10-28 09:58:34 -05:00 |
|
Brendan Coles
|
a060fec760
|
Detect version in check()
|
2014-10-28 12:28:18 +00:00 |
|
jvazquez-r7
|
373ce8d340
|
Use perl encoding
|
2014-10-27 15:30:02 -05:00 |
|
Luke Imhoff
|
216360d664
|
Add missing require
MSP-11145
|
2014-10-27 15:19:59 -05:00 |
|
jvazquez-r7
|
9da83b6782
|
Update master changes
|
2014-10-27 14:35:30 -05:00 |
|
Spencer McIntyre
|
04a99f09bb
|
Land #4064, Win32k.sys NULL Pointer Dereference
|
2014-10-27 14:01:07 -04:00 |
|
William Vu
|
950fc46e4b
|
Normalize description
|
2014-10-27 12:09:39 -05:00 |
|
Spencer McIntyre
|
830f631da4
|
Make the check routine less strict
|
2014-10-27 12:51:20 -04:00 |
|
sinn3r
|
aa5dc0a354
|
100 columns per line
|
2014-10-27 10:24:11 -05:00 |
|
sinn3r
|
7e56948191
|
Update description about pureftpd_bash_env_exec
Make exploitable requirements more obvious
|
2014-10-27 10:23:06 -05:00 |
|
Spencer McIntyre
|
46b1abac4a
|
More robust check routine for cve-2014-4113
|
2014-10-27 11:19:12 -04:00 |
|
jvazquez-r7
|
4406972b46
|
Do version checking minor cleanup
|
2014-10-27 09:32:42 -05:00 |
|
jvazquez-r7
|
c319ea91b3
|
Delete verbose print
|
2014-10-26 17:31:19 -05:00 |
|
jvazquez-r7
|
34697a2240
|
Delete 'callback3' also from 32 bits version
|
2014-10-26 17:28:35 -05:00 |
|
Spencer McIntyre
|
7416c00416
|
Initial addition of x64 target for cve-2014-4113
|
2014-10-26 16:54:42 -04:00 |
|
Brendan Coles
|
554935e60b
|
Add check() and support CVE-2014-6278
|
2014-10-26 18:11:36 +00:00 |
|
jvazquez-r7
|
a75186d770
|
Add module for CVE-2014-4113
|
2014-10-23 18:51:30 -05:00 |
|
sinn3r
|
7cb4320a76
|
Land #3561 - unix cmd generic_sh encoder
|
2014-10-23 15:48:00 -05:00 |
|
sinn3r
|
13fd6a3374
|
Land #4046 - Centreon SQL and Command Injection
|
2014-10-23 13:17:00 -05:00 |
|
sinn3r
|
ce841e57e2
|
Rephrase about centreon.session
|
2014-10-23 13:15:55 -05:00 |
|
sinn3r
|
889045d1b6
|
Change failure message
|
2014-10-23 12:55:27 -05:00 |
|
Spencer McIntyre
|
f886ab6f97
|
Land #4020, Jenkins-CI CSRF token support
|
2014-10-20 19:03:24 -04:00 |
|
jvazquez-r7
|
c77a0984bd
|
Land #3989, @us3r777's exploit for CVE-2014-7228, Joomla Update unserialize
the commit.
empty message aborts
|
2014-10-20 13:39:08 -05:00 |
|
jvazquez-r7
|
4e6f61766d
|
Change module filename
|
2014-10-20 13:31:22 -05:00 |
|
jvazquez-r7
|
e202bc10f0
|
Fix title
|
2014-10-20 13:30:44 -05:00 |
|
jvazquez-r7
|
f07c5de711
|
Do code cleanup
|
2014-10-20 13:27:48 -05:00 |
|
sinn3r
|
dbaf9c5857
|
Land #4001 - HP Data Protector EXEC_INTEGUTIL Remote Code Execution
|
2014-10-20 11:44:21 -05:00 |
|
Tod Beardsley
|
6812b8fa82
|
Typo and grammar
|
2014-10-20 11:02:09 -05:00 |
|
jvazquez-r7
|
052a9fec86
|
Delete return
|
2014-10-20 10:52:33 -05:00 |
|
jvazquez-r7
|
199f6eba76
|
Fix check method
|
2014-10-20 10:46:40 -05:00 |
|
us3r777
|
16101612a4
|
Some changes to use primer
Follow wiki How-to-write-a-module-using-HttpServer-and-HttpClient
|
2014-10-20 17:26:16 +02:00 |
|
us3r777
|
1e143fa300
|
Removed unused variables
|
2014-10-20 16:58:41 +02:00 |
|
Spencer McIntyre
|
005baa7f7e
|
Retry the script page request to get the token
After logging in to Jenkins the script console page
needs to be requested again to get the CSRF token.
|
2014-10-19 14:04:16 -04:00 |
|
Brendan Coles
|
0ede70e7f6
|
Add exploit module for CUPS shellshock
|
2014-10-19 17:58:49 +00:00 |
|
sinn3r
|
d1523c59a9
|
Land #3965 - BMC Track-It! Arbitrary File Upload
|
2014-10-17 19:47:42 -05:00 |
|
sinn3r
|
8b5a33c23f
|
Land #4044 - MS14-060 "Sandworm"
|
2014-10-17 16:46:32 -05:00 |
|
William Vu
|
d5b698bf2d
|
Land #3944, pkexec exploit
|
2014-10-17 16:30:55 -05:00 |
|