.. |
CVE-2008-5353
|
add a makefile so i don't forget how to compile this stuff
|
2010-07-21 07:27:15 +00:00 |
CVE-2008-5499
|
Minor fixes
|
2012-04-19 18:07:35 -05:00 |
CVE-2009-3867
|
compile java applet with 1.3, Fixes #685
|
2009-12-14 17:26:19 +00:00 |
CVE-2009-3869
|
add exploit module for cve-2009-3869
|
2009-12-17 04:52:40 +00:00 |
CVE-2010-0094
|
add an exploit module for cve-2010-0094, thanks Matthias Kaiser.
|
2010-09-08 08:20:55 +00:00 |
CVE-2010-0232
|
Quick fix to x64 kitrap0d project
|
2013-12-20 09:51:24 +10:00 |
CVE-2010-0840/vuln
|
add source code for cve-2010-0840
|
2010-08-21 07:27:26 +00:00 |
CVE-2010-0842/MixerMidiApplet
|
Added CVE-2010-0842
|
2012-02-15 23:32:31 +01:00 |
CVE-2010-3563
|
add an exploit for cve-2010-3563, thanks Matthias Kaiser
|
2010-11-19 23:02:35 +00:00 |
CVE-2011-0609
|
made the shellcode request random to avoid signatures
|
2011-03-26 16:00:52 +00:00 |
CVE-2011-2110
|
added adobe flashplayer array indexing exploit (CVE-2011-2110)
|
2012-06-20 12:52:37 +10:00 |
CVE-2011-3544
|
The more description the better
|
2011-12-01 03:03:37 -06:00 |
CVE-2012-0507
|
Add checks for data being null, too, just in case
|
2012-03-30 16:46:49 -06:00 |
CVE-2012-0754
|
Add CVE-2012-0754 .as source
|
2012-03-07 19:25:51 -06:00 |
CVE-2012-0779
|
changes on openfire_auth_bypass
|
2012-06-27 23:16:07 +02:00 |
CVE-2012-1535
|
Improve CVE-2012-1535
|
2012-08-21 19:58:21 -05:00 |
CVE-2012-1723
|
Last touch-up
|
2012-07-10 00:37:07 -05:00 |
CVE-2012-4681
|
Update source information
|
2012-08-30 17:48:02 -05:00 |
CVE-2013-0634
|
Beautify and fix both ruby an AS
|
2014-04-17 23:32:29 -05:00 |
CVE-2013-2171
|
Fix CVE-2013-2171 with @jlee-r7 feedback
|
2013-06-25 10:40:55 -05:00 |
CVE-2013-2465
|
Fix the makefile to use the right directory
|
2014-08-03 13:38:15 -05:00 |
CVE-2013-5331
|
Add module for CVE-2013-5331
|
2014-04-27 10:40:46 -05:00 |
CVE-2013-6282
|
fix double \n in printf
|
2016-12-13 17:02:23 +08:00 |
CVE-2014-0322
|
Add module for CVE-2014-0322
|
2014-04-15 17:55:24 -05:00 |
CVE-2014-0497
|
Add module for CVE-2014-0497
|
2014-05-03 20:04:46 -05:00 |
CVE-2014-0515
|
Delete debug
|
2015-06-11 17:39:36 -05:00 |
CVE-2014-0556
|
Update AS code
|
2015-06-04 18:34:08 -05:00 |
CVE-2014-0569
|
Really fix indentation
|
2015-06-09 12:42:32 -05:00 |
CVE-2014-3153
|
fork early and use WfsDelay
|
2016-12-20 00:59:27 +08:00 |
CVE-2014-4404
|
Change paths, add makefile and compile
|
2014-11-30 21:06:11 -06:00 |
CVE-2014-8440
|
Make last code cleanup
|
2015-06-09 16:01:57 -05:00 |
CVE-2015-0311
|
Update AS source code
|
2015-06-04 12:12:49 -05:00 |
CVE-2015-0313
|
Fix indentation
|
2015-06-10 12:27:52 -05:00 |
CVE-2015-0318
|
Update Main.as
|
2015-03-13 11:40:16 -05:00 |
CVE-2015-0336
|
Add support for Windows 8.1/Firefox
|
2015-06-03 22:46:04 -05:00 |
CVE-2015-0359
|
Fix exploit indentation
|
2015-06-10 14:19:36 -05:00 |
CVE-2015-1328
|
revamped
|
2016-10-15 20:57:31 -04:00 |
CVE-2015-2426
|
Add exploit source
|
2015-09-15 14:54:05 -05:00 |
CVE-2015-3090
|
Fix one more line indentation
|
2015-06-18 12:40:30 -05:00 |
CVE-2015-3105
|
Fix indentation
|
2015-06-25 14:12:23 -05:00 |
CVE-2015-3113
|
Add module for CVE-2015-3113
|
2015-07-01 13:13:57 -05:00 |
CVE-2015-5119
|
Add build comment
|
2015-07-15 18:30:05 -05:00 |
CVE-2015-5122
|
Add support for Windows 10(10240) to CVE-2015-5122
|
2019-06-01 14:44:30 +09:00 |
CVE-2015-8103
|
Add Jenkins CLI Java serialization exploit module
|
2015-12-11 14:57:10 -06:00 |
CVE-2015-8660
|
moved c code to external sources
|
2016-10-13 20:37:03 -04:00 |
CVE-2016-0040
|
We don't need the application.c file
|
2018-05-03 15:08:42 -05:00 |
CVE-2016-4655
|
add find_memcmp() offsets
|
2018-10-22 19:49:34 +08:00 |
CVE-2016-4669
|
remove debug logging from the kernel exploit
|
2020-07-30 18:10:26 +08:00 |
CVE-2017-13861
|
fix build when missing IOKit headers
|
2019-06-02 10:19:24 +08:00 |
CVE-2018-0824
|
Get everything together finally (still needs cleanup)
|
2018-10-19 18:15:44 -05:00 |
CVE-2018-4237
|
fix forking
|
2018-11-20 15:58:55 +08:00 |
CVE-2018-4404
|
move offsets to hash
|
2018-11-20 17:58:34 +08:00 |
CVE-2018-8120
|
removed original binary, added source
|
2018-10-11 11:42:51 -05:00 |
CVE-2018-8440/dll
|
Inject Payload to Memory First
|
2018-09-19 21:13:49 -05:00 |
CVE-2018-8453
|
Add cve-2018-8453 exploit module
|
2019-07-09 07:15:13 -05:00 |
CVE-2019-0808
|
Recompile DLL and alter vcxproj file to automatically place generated DLL in right folder
|
2020-05-06 16:33:01 -05:00 |
CVE-2019-0841
|
move source to external/source directory
|
2019-07-09 09:08:28 -05:00 |
CVE-2019-1322/CVE-2019-1322-EXE
|
Randomize container name
|
2019-12-12 07:48:01 -06:00 |
CVE-2019-1458
|
CVE-2019-1458 chrome sandbox escape initial commit
|
2020-10-15 10:57:46 -05:00 |
CVE-2019-2215
|
Initial commit of CVE-2019-2215 Android Binder Use-After-Free
|
2019-10-17 18:48:49 +08:00 |
CVE-2019-5736
|
Last additions and improvements
|
2021-06-30 11:02:11 +02:00 |
CVE-2019-8513
|
fix cleanup
|
2019-04-21 16:02:10 +08:00 |
CVE-2019-8565
|
Add CVE-2019-8565 OSX Feedback Assistant local root exploit
|
2019-05-07 04:30:47 +08:00 |
CVE-2020-0787
|
Recompile everything so we don't have the messagebox calls
|
2020-06-11 00:18:45 -05:00 |
CVE-2020-0796
|
Couple of minor cleanups for the assembly stub
|
2021-05-20 17:20:57 -04:00 |
CVE-2020-1048/cve-2020-1048-exe
|
Rubocop on module and update error handling on exploit C code + recompile
|
2020-09-16 11:17:39 -05:00 |
CVE-2020-1054
|
add offsets
|
2020-12-14 14:54:54 +00:00 |
CVE-2020-1313/cve-2020-1313-exe
|
Rubocop, fix check method, clean up c code
|
2020-09-22 07:45:02 -05:00 |
CVE-2020-7200/OlderDeserialization
|
Add source code for generating emp.ser
|
2021-03-03 10:14:48 -06:00 |
CVE-2020-9839
|
getroot -> make writable
|
2020-08-18 16:18:38 +08:00 |
CVE-2020-9850
|
remove CMakeLists.txt
|
2020-09-01 17:14:21 +08:00 |
CVE-2020-17136
|
Make second round of review edits to fix Spencer's comments
|
2021-01-08 12:50:52 -06:00 |
CVE-2020-25736
|
use 2021 helper name in objective-c code too
|
2022-12-12 15:55:36 -06:00 |
CVE-2021-3490/Linux_LPE_eBPF_CVE-2021-3490
|
Update exploit code to use & after the command to execute as root so it executes in the background and doesn't hang Metasploit. Also update the logic of the code to check the response from executing the exploit and respond accordingly and update the documentation to match
|
2021-08-31 15:07:37 -05:00 |
CVE-2021-3493
|
Updated exploit to compile on target, added control over directory creation
|
2021-12-01 14:54:47 -06:00 |
CVE-2021-21551
|
Add targeting for Windows 10 v21H1
|
2021-05-18 12:56:02 -04:00 |
CVE-2021-22555
|
Add PoC for CVE-2021-22555 Netfilter Priv Escalation
|
2021-10-04 16:48:23 +01:00 |
CVE-2021-40449
|
Make adjustments to dllmain.c from reviews and recompile the DLL again
|
2021-11-09 10:49:14 -06:00 |
CVE-2021-44228
|
Authors cleanup
|
2021-12-29 10:56:44 -05:00 |
CVE-2022-1043
|
updates to module
|
2023-01-31 20:05:33 -05:00 |
CVE-2022-1471
|
Address comments from the review
|
2023-10-12 09:50:19 -04:00 |
CVE-2022-3699
|
Removed 22621
|
2023-01-19 14:47:20 -05:00 |
CVE-2022-21882
|
One exploit for CVE-2021-1732 and CVE-2022-21882
|
2022-02-18 15:23:38 -05:00 |
CVE-2022-22942
|
Update LICENSE file and location of source file
|
2023-01-17 17:28:22 -05:00 |
CVE-2022-26904
|
Update data to fix more things found during review process
|
2022-04-05 12:48:11 -05:00 |
CVE-2022-34918
|
Add MAX_TRIES option, address the feedback of bwatters-r7
|
2022-08-11 13:21:14 +02:00 |
CVE-2022-46689
|
Add CVE-2022-46689 macOS dirty cow
|
2022-12-28 22:46:08 +07:00 |
CVE-2023-21768
|
Add exploit for CVE-2023-21768
|
2023-03-27 20:08:22 +02:00 |
CVE-2023-28252
|
Responded to comments, improved stability
|
2023-08-21 19:20:25 -04:00 |
CVE-2023-36874/CVE-2023-36874
|
Add error checking and randomize the report directory
|
2023-09-22 14:43:21 -05:00 |
IE11SandboxEscapes
|
Land #3403 - MS13-097 Registry Symlink IE Sandbox Escape
|
2014-06-26 13:48:28 -05:00 |
batik_svg
|
Added batik svg java module
|
2012-05-17 16:48:38 +02:00 |
bypassuac
|
remove some dead code paths
|
2014-02-27 11:45:57 -06:00 |
bypassuac_injection
|
Add bypassuac_injection_winsxs.rb module
|
2017-06-03 12:59:50 +02:00 |
capcom_sys_exec
|
Move execute_payload to the kernel lib
|
2017-01-17 11:19:26 +10:00 |
cve-2010-4452
|
enable java payloads, currently via one-off method
|
2011-03-17 23:57:11 +00:00 |
cve-2012-5076
|
fixing bperry comments
|
2012-11-11 20:18:19 +01:00 |
cve-2012-5076_2
|
Update external/source/exploits/cve-2012-5076_2/Makefile
|
2013-01-23 20:18:24 +01:00 |
cve-2012-5088
|
Update external/source/exploits/cve-2012-5088/Makefile
|
2013-01-23 12:42:33 +01:00 |
cve-2013-0074
|
Switch to soft tabs the cs code
|
2013-11-23 23:06:52 -06:00 |
cve-2013-0109
|
Add make script for nvidia nvsvc
|
2013-12-15 01:12:49 +00:00 |
cve-2013-0422
|
cve and references available
|
2013-01-11 00:54:53 +01:00 |
cve-2013-0431
|
makefile updated
|
2013-02-21 13:44:37 +01:00 |
cve-2013-1300
|
Address OJ's comments
|
2014-05-02 13:33:55 +01:00 |
cve-2013-1488
|
Add module for CVE-2013-1488
|
2013-06-07 13:38:41 -05:00 |
cve-2013-1493
|
Added module for CVE-2013-1493
|
2013-03-26 22:30:18 +01:00 |
cve-2013-2460
|
Delete project files
|
2013-06-25 12:58:39 -05:00 |
cve-2013-3660
|
Merge remote-tracking branch 'upstream/master' into submodule
|
2013-12-08 18:25:03 +00:00 |
cve-2013-3881
|
Upgrade toolchain to Visual Studio 2013 v120.
|
2014-02-10 09:35:07 -05:00 |
cve-2014-4113
|
Use PDWORD_PTR and DWORD_PTR
|
2014-10-31 17:35:50 -05:00 |
cve-2015-0016
|
Replace external source
|
2015-08-26 15:32:50 -05:00 |
cve-2015-1701
|
Support older targets x86 for MS15-051
|
2015-06-25 09:33:15 +10:00 |
cve-2016-0051/dll
|
refactor ms16-016 code
|
2016-07-05 20:50:43 -05:00 |
cve-2016-0189
|
add exploit for cve-2016-0189
|
2016-08-01 13:26:35 -05:00 |
cve-2017-8464
|
Refactor GetProcessSid to remove do while FALSE
|
2017-11-07 19:11:24 -05:00 |
cve-2018-8897
|
Update mov_ss and add mov_ss_dll
|
2018-07-27 09:40:34 -05:00 |
cve-2022-0995
|
Semicolon....
|
2022-04-20 17:41:16 -05:00 |
dell_memory_protect
|
Pulled offsets out of dll into module. Auto-find lsass.exe when pid is 0
|
2021-12-18 10:56:46 -08:00 |
drunkpotato
|
Fixing a little error.
|
2020-12-10 05:15:37 -05:00 |
exec_payload_msi
|
Move MSI source and binary location
|
2012-11-27 18:12:49 +00:00 |
jre17u17
|
fix small issues
|
2013-04-20 01:43:14 -05:00 |
juicypotato
|
chore: update juicy potato reflective DLL source to latest
|
2019-01-12 04:02:13 +01:00 |
ntapphelpcachecontrol
|
Not needed anymore
|
2015-01-09 19:05:44 -06:00 |
office_word_macro
|
Support OS X for Microsoft Office macro exploit
|
2017-02-16 12:28:11 -06:00 |
openfire_plugin
|
Adjust files to be better shared
|
2023-07-14 12:47:04 -05:00 |
rottenpotato
|
Recompile binaries and prep for VS2013 compiles
|
2018-10-04 16:21:23 -05:00 |
splunk/upload_app_exec
|
Cleanup of #1062
|
2012-12-07 11:55:48 +01:00 |
tpwn
|
Move tpwn source to external/source/exploits
|
2015-08-17 18:27:47 -05:00 |
windows-lpe-template
|
Add a Windows LPE exploit template for x64/x86
|
2017-01-17 11:20:14 +10:00 |
make.bat
|
Add LPE exploit module for the capcom driver flaw
|
2016-09-27 22:37:45 +10:00 |