1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-29 18:07:27 +01:00
Commit Graph

6 Commits

Author SHA1 Message Date
Tod Beardsley
f58e279066 Cleanup on module names, descriptions. 2013-06-10 10:52:22 -05:00
sinn3r
ea2895ac13 Change to AverageRanking
Just to play with the firing order for Browser Autopwn, this one
should fire as late as possible.
2013-06-07 12:08:51 -05:00
sinn3r
9c7b446532 Updates description about default browser setting 2013-06-07 11:58:31 -05:00
sinn3r
f3421f2c3a Fix different landings 2013-06-07 10:26:04 -05:00
sinn3r
e559824dc8 Remove whitespace 2013-06-06 20:08:50 -05:00
sinn3r
d3e57ffc46 Add OSVDB-93754: Synactis PDF In-The-Box ConnectToSynactic Stack Buffer Overflow
This module exploits a vulnerability found in Synactis' PDF In-The-Box ActiveX
component, specifically PDF_IN_1.ocx.  When a long string of data is given
to the ConnectToSynactis function, which is meant to be used for the ldCmdLine
argument of a WinExec call, a strcpy routine can end up overwriting a TRegistry
class pointer saved on the stack, and results in arbitrary code execution under the
context of the user.
2013-06-06 20:05:08 -05:00