1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-10-29 18:07:27 +01:00
metasploit-framework/data/exploits
2022-07-22 03:30:03 +02:00
..
badodt Add files via upload 2018-05-24 09:45:38 +01:00
batik_svg Permissions 2012-06-06 20:05:29 -05:00
capcom_sys_exec Add LPE exploit module for the capcom driver flaw 2016-09-27 22:37:45 +10:00
capture/http File.exists? must die 2016-04-21 00:47:07 -04:00
cve-2010-0094 Permission changes (to sync) 2011-11-10 19:48:32 -06:00
cve-2010-0840/vuln Permission changes (to sync) 2011-11-10 19:48:32 -06:00
cve-2010-3563 Permission changes (to sync) 2011-11-10 19:48:32 -06:00
cve-2010-3904 Add Reliable Datagram Sockets (RDS) Privilege Escalation 2018-05-03 12:51:21 +00:00
cve-2010-4452 Permission changes (to sync) 2011-11-10 19:48:32 -06:00
cve-2011-3544 Allows for Loot and Tasks to be imported from an MSF ZIP. 2011-12-05 22:30:34 -05:00
cve-2012-0217 Use @iZsh's exploit 2018-12-21 15:40:01 +00:00
cve-2012-5076 fixing bperry comments 2012-11-11 20:18:19 +01:00
cve-2012-5076_2 Added new module for cve-2012-5076 2013-01-17 21:27:47 +01:00
cve-2012-5088 Added module for CVE-2012-5088 2013-01-17 21:14:49 +01:00
cve-2013-0074 Small fix to interface 2013-11-22 17:02:08 -06:00
cve-2013-0422 cve and references available 2013-01-11 00:54:53 +01:00
cve-2013-0431 added security level bypass 2013-02-20 17:50:47 +01:00
cve-2013-1300 Use signed binary 2014-05-02 14:45:14 +01:00
cve-2013-1488 Add module for CVE-2013-1488 2013-06-07 13:38:41 -05:00
cve-2013-1493 Added module for CVE-2013-1493 2013-03-26 22:30:18 +01:00
cve-2013-2460 Make fixes proposed by review and clean 2013-06-25 12:58:00 -05:00
cve-2013-3660 ppr_flatten_rec update, RDI submodule, and refactor 2013-11-27 20:44:18 +10:00
cve-2013-3881 Add binary compiled on vs2013 2014-02-10 13:52:27 -06:00
cve-2014-1610 Use msf branded djvu 2014-02-01 00:37:28 +00:00
cve-2015-1318 Use cross-compiled exploit 2018-01-13 05:44:42 +00:00
cve-2015-3315 Add ABRT raceabrt Privilege Escalation module 2018-01-16 14:52:33 +00:00
cve-2015-5287 Add sosreport-rhel7.py 2019-04-20 11:56:01 +00:00
cve-2016-0051 refactor ms16-016 code 2016-07-05 20:50:43 -05:00
cve-2016-0189 add exploit for cve-2016-0189 2016-08-01 13:26:35 -05:00
cve-2016-6415 CVE-2016-6415 Cisco - sendpacket.raw 2016-09-29 22:24:55 -05:00
cve-2017-7308 Recompile pre-compiled exploit executable (stripped, no DEBUG) 2018-05-17 09:43:07 +00:00
cve-2017-8464 recompile binaries 2017-11-08 09:33:48 -06:00
cve-2017-16995 Add in compiled version of the exploit to meet Rapid7 compliance guidelines on having Rapid7 employees submit compiled binaries only 2020-10-23 16:01:00 -05:00
cve-2017-1000112 Fix ufo_privilege_escalation 2018-07-08 11:05:30 +00:00
cve-2018-8897 Combine the modules and update the binaries 2018-07-27 11:08:04 -05:00
cve-2018-18955 Add musl-cross cross-compiled executables 2018-11-25 00:53:55 +00:00
cve-2018-1000001 Add glibc 'realpath()' Privilege Escalation exploit 2018-05-26 21:25:59 +00:00
cve-2019-1322 Randomize container name 2019-12-12 07:48:01 -06:00
cve-2020-0668 Working through mountpoint issues 2020-04-21 09:54:45 -05:00
cve-2020-1313 First attempt at CVE-2020-1313 2020-09-18 15:39:12 -05:00
cve-2021-3490 Update exploit code to use & after the command to execute as root so it executes in the background and doesn't hang Metasploit. Also update the logic of the code to check the response from executing the exploit and respond accordingly and update the documentation to match 2021-08-31 15:07:37 -05:00
cve-2022-0995 Update c source with argc check and CRASH notes for module 2022-04-20 17:37:48 -05:00
CVE-2008-6508 Permissions. 2012-06-28 11:42:37 -05:00
CVE-2010-0232 Remove genericity, x64 and renamed stuff 2013-11-14 12:22:53 +10:00
CVE-2010-0842 Fix my screwup in winscp for servicename 2012-02-21 20:31:52 -06:00
CVE-2010-1240 Add an R in /Info for the trailer dictionary to make it readable 2014-11-05 22:28:37 -06:00
CVE-2011-2882 Permission changes (to sync) 2011-11-10 19:48:32 -06:00
CVE-2011-3400 Permissions 2012-06-12 15:20:25 -05:00
CVE-2012-0013 Permissions 2012-06-12 15:20:25 -05:00
CVE-2012-1535 Add Main.swf from 593363c 2013-07-29 21:53:40 -05:00
CVE-2012-2516 added chm templates 2012-10-10 19:21:47 +02:00
CVE-2012-4681 changed dir names according to CVE 2012-08-28 16:33:01 +02:00
CVE-2012-6636 add ndkstager to data/exploits 2018-10-05 15:10:21 +08:00
CVE-2013-0109 Final changes before PR 2013-12-15 01:12:49 +00:00
CVE-2013-0634 Beautify and fix both ruby an AS 2014-04-17 23:32:29 -05:00
CVE-2013-2465 Change directory names 2013-08-15 22:52:42 -05:00
CVE-2013-3906 Initial commit of CVE-2013-3906 2013-11-19 23:10:32 -06:00
CVE-2013-5045 Use powershell instead of mshta 2014-06-03 09:01:56 -05:00
CVE-2013-5331 Add module for CVE-2013-5331 2014-04-27 10:40:46 -05:00
CVE-2014-0038 Cleanup linux/local/recvmmsg_priv_esc module 2018-05-24 17:56:07 +00:00
CVE-2014-0257 Do test 2014-06-03 09:52:01 -05:00
CVE-2014-0322 Add module for CVE-2014-0322 2014-04-15 17:55:24 -05:00
CVE-2014-0497 Add module for CVE-2014-0497 2014-05-03 20:04:46 -05:00
CVE-2014-0515 Delete debug 2015-06-11 17:39:36 -05:00
CVE-2014-0556 Update CVE-2014-0556 2015-06-04 18:23:50 -05:00
CVE-2014-0569 Unset debug flag 2015-06-09 11:36:09 -05:00
CVE-2014-2630 working exploit 2020-04-19 15:19:19 -04:00
CVE-2014-4113 Use PDWORD_PTR and DWORD_PTR 2014-10-31 17:35:50 -05:00
CVE-2014-4114/template Add ppsx template 2014-10-16 17:55:22 -05:00
CVE-2014-4404 Change paths, add makefile and compile 2014-11-30 21:06:11 -06:00
CVE-2014-6352/template_run_as_admin Add module for CVE-2014-6352 2014-11-12 01:10:49 -06:00
CVE-2014-8440 Make last code cleanup 2015-06-09 16:01:57 -05:00
CVE-2015-0016 Update DLL 2015-08-26 15:15:32 -05:00
CVE-2015-0311 Add more targets 2015-06-04 12:11:53 -05:00
CVE-2015-0313 Allow more search space 2015-06-10 12:26:53 -05:00
CVE-2015-0318 This seems to work 2015-03-13 04:43:06 -05:00
CVE-2015-0336 Add support for Windows 8.1/Firefox 2015-06-03 22:46:04 -05:00
CVE-2015-0359 Disable debug 2015-06-10 14:07:18 -05:00
CVE-2015-1130 python 3 compatibility 2019-02-13 22:20:29 +01:00
CVE-2015-1328 revamped 2016-10-15 20:57:31 -04:00
CVE-2015-1701 Update exploit binaries for ms15-051 2015-06-25 09:33:15 +10:00
CVE-2015-2426 Clean template code 2015-09-12 13:43:05 -05:00
CVE-2015-3090 Add module for CVE-2015-3090 2015-06-18 12:36:14 -05:00
CVE-2015-3105 Add module for CVE-2015-3105 2015-06-25 13:35:01 -05:00
CVE-2015-3113 Add module for CVE-2015-3113 2015-07-01 13:13:57 -05:00
CVE-2015-3673 Remove sleep(), clean up WritableDir usage. 2015-07-05 18:59:00 -05:00
CVE-2015-5119 Update swf 2015-07-15 18:35:41 -05:00
CVE-2015-5122 Add support for Windows 10(10240) to CVE-2015-5122 2019-06-01 14:44:30 +09:00
CVE-2015-8103 Add Jenkins CLI Java serialization exploit module 2015-12-11 14:57:10 -06:00
CVE-2015-8660 working module 2016-10-04 23:21:53 -04:00
CVE-2016-0040 Re-add compiled Binary 2018-05-03 15:50:15 -05:00
CVE-2016-0099 Add a random sentinel to close channel when terminates (#1) 2020-01-25 23:30:49 +01:00
CVE-2016-4117 initial import, CVE-2016-4117 OSX exploit 2018-12-21 02:54:35 -06:00
CVE-2016-4557 Fix bpf_priv_esc module 2018-12-12 17:23:12 +00:00
CVE-2016-4655 add DEBUG exploit binary 2018-10-22 19:51:21 +08:00
CVE-2016-4669 remove debug logging from the kernel exploit 2020-07-30 18:10:26 +08:00
CVE-2016-4997 binary drops work! 2016-09-24 21:31:00 -04:00
CVE-2016-8655 Update AF_PACKET chocobo_root Privilege Escalation module 2020-01-19 11:51:01 +00:00
CVE-2017-0358 move sploit.c out to data folder 2017-03-31 20:51:33 -04:00
CVE-2017-7494 Rename payloads with os+libc, shrink array inits 2017-05-27 19:50:31 -05:00
CVE-2017-8291 Quick Ghostscript module based on the public PoC 2017-04-28 09:56:52 -05:00
CVE-2017-13861 add exploit binary 2019-06-02 10:19:24 +08:00
CVE-2017-16666 Add xplico remote code execution 2017-11-14 09:30:57 +03:00
CVE-2017-17562 Resolve a bug in reverse_tcp and segfaults across payloads 2017-12-29 14:18:55 -06:00
CVE-2017-1000353 add poc 2020-09-11 12:00:16 -05:00
CVE-2018-0824 Remove duplicated files 2018-10-23 12:31:18 -05:00
CVE-2018-4233 move int64.js and utils.js to javascript_utils folder 2020-09-01 16:14:31 +08:00
CVE-2018-4237 add binary 2018-11-20 15:59:23 +08:00
CVE-2018-4404 add binaries 2018-11-15 08:46:24 +08:00
CVE-2018-5333 Add rds_atomic_free_op_null_pointer_deref_priv_esc (CVE-2018-5333) 2020-01-18 08:34:52 +00:00
CVE-2018-8120 addressed suggestions 2018-10-12 14:35:42 -05:00
CVE-2018-8440 Inject Payload to Memory First 2018-09-19 21:13:49 -05:00
CVE-2018-8453 Add cve-2018-8453 exploit module 2019-07-09 07:15:13 -05:00
CVE-2018-9948 Cleanup for foxit_reader_uaf 2018-09-05 21:47:57 -05:00
CVE-2018-16858 reduced file size 2019-04-16 09:06:44 -05:00
CVE-2018-19276 add xml erb file 2019-12-02 08:44:37 -06:00
CVE-2019-0808 Recompile DLL and alter vcxproj file to automatically place generated DLL in right folder 2020-05-06 16:33:01 -05:00
CVE-2019-0841 move source to external/source directory 2019-07-09 09:08:28 -05:00
CVE-2019-1458 Recompile the exploit.dll DLL for CVE-2019-1458 as per Rapid7 policies 2020-10-15 10:58:56 -05:00
CVE-2019-2215 Initial commit of CVE-2019-2215 Android Binder Use-After-Free 2019-10-17 18:48:49 +08:00
CVE-2019-5736 Last additions and improvements 2021-06-30 11:02:11 +02:00
CVE-2019-8513 add exploit binary 2019-04-21 16:02:10 +08:00
CVE-2019-8565 Add CVE-2019-8565 OSX Feedback Assistant local root exploit 2019-05-07 04:30:47 +08:00
CVE-2019-9848 @LoadLow Marks the generated ODT file readonly 2019-08-18 18:36:31 +02:00
CVE-2019-12477 Implement on_request_uri 2019-06-25 23:47:19 -05:00
CVE-2019-13272 Update CVE-2019-13272 pre-compiled exploit 2020-05-11 13:36:41 +00:00
CVE-2020-0787 Recompile everything so we don't have the messagebox calls 2020-06-11 00:18:45 -05:00
CVE-2020-0796 Add the x64 LPE exploit for CVE-2020-0796 2020-04-02 17:22:00 -04:00
CVE-2020-1048 Update binaries 2020-09-16 11:41:02 -05:00
CVE-2020-1054 Add dll 2020-12-15 12:42:06 +01:00
CVE-2020-1337 Cleanup and edits per review from Christophe 2021-01-11 16:02:58 -06:00
CVE-2020-2555 add PoC 2020-05-04 11:08:38 -05:00
CVE-2020-2883 add poc code 2020-06-02 14:29:02 -05:00
CVE-2020-7457 Add CVE-2020-7457 exploit.c 2020-07-26 08:04:37 +00:00
CVE-2020-9839 Recompiled binary exploit file to match source 2020-09-04 15:46:52 -05:00
CVE-2020-9850 add exploit binaries 2020-09-01 17:14:21 +08:00
CVE-2020-17136 Make second round of review edits to fix Spencer's comments 2021-01-08 12:50:52 -06:00
CVE-2021-3156 Tested on various other Fedora's 2021-05-04 14:18:16 +10:00
CVE-2021-3493 Add support for aarch64 Ubuntu versions 2021-12-01 14:54:48 -06:00
CVE-2021-4034 Remove unneeded files 2022-02-18 16:33:39 -06:00
CVE-2021-21551 Add targeting for Windows 10 v21H1 2021-05-18 12:56:02 -04:00
CVE-2021-22204 Add CVE-2021-22204 ExifTool ANT perl injection 2021-05-11 12:02:12 +10:00
CVE-2021-22555 Add PoC for CVE-2021-22555 Netfilter Priv Escalation 2021-10-04 16:48:23 +01:00
CVE-2021-38648 Update the Python exploit code to fix a bug 2021-11-02 10:10:18 -04:00
CVE-2021-40444 Remove the Not_Hosted target 2021-12-08 17:22:44 -05:00
CVE-2021-40449 Make adjustments to dllmain.c from reviews and recompile the DLL again 2021-11-09 10:49:14 -06:00
CVE-2021-44228 First "working" 2021-44228 exploit module state 2021-12-29 09:10:07 -05:00
CVE-2022-0847 add binaries for pre-compiled option 2022-03-10 08:50:48 -06:00
CVE-2022-21882 One exploit for CVE-2021-1732 and CVE-2022-21882 2022-02-18 15:23:38 -05:00
CVE-2022-26904 Update data to fix more things found during review process 2022-04-05 12:48:11 -05:00
CVE-2022-34918 Add module docs, add Ubuntu 22.04 offsets, update check method 2022-07-22 03:30:03 +02:00
dell_protect Pulled offsets out of dll into module. Auto-find lsass.exe when pid is 0 2021-12-18 10:56:46 -08:00
docx Data files moved. Updated to use Rex::zip and Msf::Exploit::FILEFORMAT 2013-02-04 13:37:09 +01:00
drunkpotato Adding DLL's 2021-01-06 15:59:08 +01:00
edb-35948 Call CollectGarbage 2015-02-09 14:44:31 -06:00
firefox_smil_uaf initial commit of finished product 2017-01-20 11:01:36 -06:00
ghostscript Add Ghostscript failed restore exploit 2018-09-05 19:56:32 -05:00
hpe_sim_76_amf_deserialization First attempt at CVE-2020-7200 module, with RuboCopped module 2021-03-02 16:38:19 -06:00
imagemagick Add PS template 2016-10-13 17:40:15 -05:00
java_signed_applet Permission changes (to sync) 2011-11-10 19:48:32 -06:00
javascript_utils move int64.js and utils.js to javascript_utils folder 2020-09-01 16:14:31 +08:00
jre7u17 Added module for Java 7u17 sandboxy bypass 2013-04-20 01:43:13 -05:00
juicypotato build: recompile dlls 2019-01-12 04:02:34 +01:00
ldap Native LDAP infrastructure to support log4shell 2021-12-16 18:47:52 -05:00
mssql Permission changes (to sync) 2011-11-10 19:48:32 -06:00
mysql updated windows udf files and documentation 2018-08-07 14:50:47 -04:00
ntapphelpcachecontrol Use RDL 2015-01-09 19:02:08 -06:00
office_word_macro Update office_word_macro exploit to support template injection 2017-05-25 15:53:45 -05:00
openoffice_document_macro Completed version of openoffice_document_macro 2017-02-08 16:29:40 -06:00
osx Add auto-accept to osx/enum_keychain. 2015-09-07 21:17:49 -05:00
persistence_service Fix additional path space issues 2018-12-17 07:00:23 -06:00
pfsense_clickjacking Added local copies of the static content 2017-12-02 10:14:14 +01:00
php Revert "Land #6812, remove broken OSVDB references" 2016-07-15 12:00:31 -05:00
poison_ivy_c2 Modifications based on suggestions by @wchen-r7 2016-06-08 01:17:15 +02:00
postgres Fixes #3988. Adds a command execution module for PostgreSQL by uploading a UDF library and adding sys_exec() as a temporary function. Requires the target to be Windows, uses Bernardo Damele A. G.'s binaries. 2011-03-23 19:36:07 +00:00
powershell fix ssl connection on Windows Server 2012 2021-11-30 06:30:59 +00:00
proxyshell Work off of the system mailbox 2021-08-27 14:32:26 -04:00
psnuffle Fix typo 2018-07-17 12:59:00 -05:00
pxexploit Adds scriptjunkie's multilingual admin fie for pxexploit 2011-12-23 12:24:45 -06:00
R7_2015_17 Add missing stream.raw for hp_sitescope_dns_tool 2016-03-15 11:06:06 -05:00
redis Add doc and enhance the module. 2019-07-20 00:17:57 +08:00
roothelper Add Libuser roothelper Privilege Escalation exploit 2018-04-23 17:49:11 +00:00
rottenpotato Recompile binaries and prep for VS2013 compiles 2018-10-04 16:21:23 -05:00
scripthost_uac_bypass Initial working scripthost bypass uac 2015-08-23 20:16:15 +01:00
splunk Cleanup of #1062 2012-12-07 11:55:48 +01:00
tokenmagic Addressed comments 2021-05-14 17:46:26 -05:00
tpwn Move tpwn source to external/source/exploits 2015-08-17 18:27:47 -05:00
uso_trigger Add Uso dll 2020-04-23 15:18:22 -05:00
uxss Add some common UXSS scripts. 2014-09-09 02:31:27 -05:00
vmware_view_planner_4_6_uploadlog_rce Quick update to make the backdoor a bit stealthier by removing the extra Payload Success! message that wasn't needed 2021-03-14 00:00:17 -06:00
wifi Permission changes (to sync) 2011-11-10 19:48:32 -06:00
cve-2010-2883.ttf Permission changes (to sync) 2011-11-10 19:48:32 -06:00
cve-2013-0758.swf Initial commit, works on three OSes, but automatic mode fails. 2013-05-15 23:32:02 -05:00
cve-2014-1761.rtf MS14-017 Word RTF listoverridecount memory corruption 2014-04-08 14:44:20 -04:00
cve-2017-0199.rtf Fix rtf info author 2017-04-14 21:16:39 -05:00
CVE-2007-3314.dat Permission changes (to sync) 2011-11-10 19:48:32 -06:00
CVE-2008-0320.doc Permissions 2012-06-06 20:05:29 -05:00
CVE-2008-5353.jar Permission changes (to sync) 2011-11-10 19:48:32 -06:00
CVE-2008-5499.swf Permission change, ignore 2012-04-23 13:42:18 -05:00
CVE-2009-3867.jar Permission changes (to sync) 2011-11-10 19:48:32 -06:00
CVE-2009-3869.jar Permission changes (to sync) 2011-11-10 19:48:32 -06:00
CVE-2010-0480.avi Permission changes (to sync) 2011-11-10 19:48:32 -06:00
CVE-2010-0822.xls Consolidation of the Axis2 Deployer Exploits 2011-11-22 08:47:53 -08:00
CVE-2010-1297.swf Permission changes (to sync) 2011-11-10 19:48:32 -06:00
CVE-2010-3275.amv Added Crash file for CVE-2010-3275 (VLC AMV file) 2011-03-25 21:01:30 +00:00
CVE-2010-3654.swf Permission changes (to sync) 2011-11-10 19:48:32 -06:00
CVE-2011-0105.xlb Permission changes (to sync) 2011-11-10 19:48:32 -06:00
CVE-2011-0257.mov Permission changes (to sync) 2011-11-10 19:48:32 -06:00
CVE-2011-0609.swf Permission changes (to sync) 2011-11-10 19:48:32 -06:00
CVE-2011-0611.swf Added swf trigger file 2011-04-16 02:08:03 +00:00
CVE-2011-2110.swf Permissions fix 2012-06-21 15:39:17 -05:00
CVE-2012-0507.jar Permissions fix for exploit jar file 2012-04-02 09:27:35 -05:00
CVE-2012-0754.swf Permisssions (ignore) 2012-03-08 16:16:13 -06:00
CVE-2012-0779.swf Permissions 2012-06-25 00:36:39 -05:00
CVE-2012-1723.jar Better handle of module cache when db_connect is run manually 2012-07-10 23:56:48 -05:00
CVE-2013-2171.bin Fix CVE-2013-2171 with @jlee-r7 feedback 2013-06-25 10:40:55 -05:00
CVE-2013-6282.so add module binary 2016-12-22 03:25:10 -06:00
CVE-2014-0980.pui Implemented Recommended Changes 2015-03-17 16:39:56 -04:00
CVE-2014-3153.so add binary for futex_requeue 2017-01-11 13:25:30 -06:00
evasion_shellcode.js improve windows_defender_js_hta : 2018-10-11 17:38:47 +02:00
exec_payload.msi added build exec_payload.msi 2012-11-28 21:51:01 +01:00
google_proxystylesheet.xml Permission changes (to sync) 2011-11-10 19:48:32 -06:00
hta_evasion.hta improve windows_defender_js_hta : 2018-10-11 17:38:47 +02:00
iceweasel_macosx.icns Permission changes (to sync) 2011-11-10 19:48:32 -06:00
iphone_libtiff.bin Permission changes (to sync) 2011-11-10 19:48:32 -06:00
modicon_ladder.apx Permissions fix for modicon_ladder.apx 2012-04-12 14:26:27 -05:00
mp4player.as Permisssions (ignore) 2012-03-08 16:16:13 -06:00
mp4player.fla Add source code to the player 2012-03-08 15:23:10 -06:00
mp4player.swf Test out new player code 2012-03-08 15:05:12 -06:00
msfJavaToolkit.jar Permission changes (to sync) 2011-11-10 19:48:32 -06:00
office_ole_multiple_dll_hijack.ppsx Moved PPSX to data/exploits folder 2016-11-08 16:04:46 +01:00
pricedown.eot Permission changes (to sync) 2011-11-10 19:48:32 -06:00
QTJavaExploit.class Permission changes (to sync) 2011-11-10 19:48:32 -06:00
runcalc.hlp Permission changes (to sync) 2011-11-10 19:48:32 -06:00
s4u_persistence.xml rename the xml template for s4u 2013-02-18 15:25:03 +01:00
shockwave_rcsl.dir Permission changes (to sync) 2011-11-10 19:48:32 -06:00
word_msdtjs.docx fix chmod 644 2022-05-30 22:11:35 +04:00