msutovsky-r7
|
3ba000cbd7
|
Added msutovsky-r7 to mail map
|
2024-12-04 17:54:01 +01:00 |
|
jenkins-metasploit
|
7265f093b8
|
automatic module_metadata_base.json update
|
2024-12-04 16:32:08 +00:00 |
|
jheysel-r7
|
21cf475cbb
|
Land #19595 Ivanti Connect Secure auth RCE via OpenSSL (CVE-2024-37404)
|
2024-12-04 08:26:07 -08:00 |
|
jenkins-metasploit
|
2f5980ba42
|
automatic module_metadata_base.json update
|
2024-12-04 15:56:05 +00:00 |
|
Jack Heysel
|
b7f9ae7ec5
|
Updated module validation spec
|
2024-12-04 07:55:16 -08:00 |
|
Diego Ledda
|
ab2ca41eb8
|
Land #19629, Chamilo v1.11.24 Unrestricted File Upload (CVE-2023-4220)
Land #19629, Chamilo v1.11.24 Unrestricted File Upload (CVE-2023-4220)
|
2024-12-04 16:49:56 +01:00 |
|
jenkins-metasploit
|
a814d77199
|
automatic module_metadata_base.json update
|
2024-12-04 15:45:43 +00:00 |
|
Diego Ledda
|
58702f238c
|
Land #19574, Windows Access Mode Mismatch LPE in ks.sys (CVE-2024-35230)
Land #19574, Windows Access Mode Mismatch LPE in ks.sys (CVE-2024-35230)
|
2024-12-04 16:39:43 +01:00 |
|
jheysel-r7
|
fa3716408f
|
Add comment explaining payload architecture restraints
|
2024-12-03 18:33:43 -08:00 |
|
adfoster-r7
|
17fdd35608
|
Merge pull request #19684 from sjanusz-r7/teamcity-improvements
TeamCity improvements
|
2024-12-03 12:25:52 +00:00 |
|
jenkins-metasploit
|
e5cfc08eac
|
automatic module_metadata_base.json update
|
2024-12-03 02:39:10 +00:00 |
|
jheysel-r7
|
2d1af7d809
|
Land #19648 Add exploit module for FortiManager (CVE-2024-47575)
|
2024-12-02 18:31:25 -08:00 |
|
jheysel-r7
|
5a837d1ef6
|
fix a typo
|
2024-12-02 18:16:43 -08:00 |
|
sjanusz-r7
|
76c93f4d33
|
Log search for TeamCity in body instead of headers
|
2024-12-02 22:04:56 +00:00 |
|
jenkins-metasploit
|
1f32f91510
|
automatic module_metadata_base.json update
|
2024-12-02 18:44:47 +00:00 |
|
Spencer McIntyre
|
d22c6996be
|
Merge pull request #18877 from h00die/xspy
New module to replicate xspy tool (and X11 library)
|
2024-12-02 13:38:37 -05:00 |
|
jenkins-metasploit
|
891b89d697
|
automatic module_metadata_base.json update
|
2024-12-02 16:27:49 +00:00 |
|
jheysel-r7
|
a230a353e4
|
Land #19613 Asterisk authenticated rce via AMI (CVE-2024-42365)
|
2024-12-02 08:21:35 -08:00 |
|
Christophe De La Fuente
|
a46b2f437f
|
Use TARGET_URI when checking the redirection URI
|
2024-12-02 16:45:12 +01:00 |
|
Christophe De La Fuente
|
3dcb9d58ab
|
Code review
|
2024-12-02 14:02:07 +01:00 |
|
Christophe De La Fuente
|
c943cc6378
|
Add module and documentation
|
2024-12-02 14:02:07 +01:00 |
|
jheysel-r7
|
1c326d6594
|
Land #19622, update windows install docs
Update Windows Installation instruction in Setting-Up-a-Metasploit-Development-Environment.md
|
2024-11-29 12:52:00 -08:00 |
|
jenkins-metasploit
|
5999a2622b
|
automatic module_metadata_base.json update
|
2024-11-29 17:14:25 +00:00 |
|
jheysel-r7
|
c4b7954f15
|
Land #19596, Wordpress Plugin Post SMTP Account Takeover
|
2024-11-29 09:05:03 -08:00 |
|
sjanusz-r7
|
e827cccd48
|
Improve TeamCity Login Scanner
|
2024-11-29 16:52:00 +00:00 |
|
h00die
|
d13bccca05
|
peer review
|
2024-11-28 20:24:25 -05:00 |
|
h00die
|
1906646e67
|
peer review
|
2024-11-28 13:18:47 -05:00 |
|
jenkins-metasploit
|
f2e5dd61fa
|
automatic module_metadata_base.json update
|
2024-11-28 17:27:49 +00:00 |
|
jheysel-r7
|
caa483a24a
|
Land #19583 Acronis Cyber Backup/Protect RCE [CVE-2022-3405]
|
2024-11-28 09:18:19 -08:00 |
|
jheysel-r7
|
65acafacfd
|
Apply suggestions from code review
|
2024-11-28 08:57:21 -08:00 |
|
Metasploit
|
6ca45601fb
|
Bump version of framework to 6.4.39
|
2024-11-28 03:32:30 -06:00 |
|
h00die-gr3y
|
2115c81654
|
update using acronis_cyber mixin
|
2024-11-27 22:21:27 +00:00 |
|
h00die-gr3y
|
a945a54fc3
|
Merge remote-tracking branch 'origin/master' into acronis-rce
|
2024-11-27 21:50:53 +00:00 |
|
h00die
|
e0a39b5d6b
|
Merge pull request #26 from smcintyre-r7/pr/collab/18877
Refactor some X11 code around
|
2024-11-27 16:33:04 -05:00 |
|
h00die-gr3y
|
3a2aa0f31c
|
module prep to use acronis_cyber mixin
|
2024-11-27 21:31:40 +00:00 |
|
Spencer McIntyre
|
cd4899da00
|
Refactor some X11 code around
Consistently refer to replys as responses
|
2024-11-27 15:19:26 -05:00 |
|
jenkins-metasploit
|
07ce1aae77
|
automatic module_metadata_base.json update
6.4.38
|
2024-11-27 15:56:37 +00:00 |
|
jheysel-r7
|
7de3d117b8
|
Land #19582 Acronis Cyber Backup/Protect Info Disclosure
|
2024-11-27 07:50:16 -08:00 |
|
h00die-gr3y
|
18c4e9c2f6
|
moved get_machine_info to the acronis_cyber mixin
|
2024-11-26 16:10:14 +00:00 |
|
h00die-gr3y
|
b6595eeaf0
|
added acronis cyber mixin
|
2024-11-26 15:49:57 +00:00 |
|
jenkins-metasploit
|
de5e94d81f
|
automatic module_metadata_base.json update
|
2024-11-26 14:11:40 +00:00 |
|
Spencer McIntyre
|
6c76dcb20c
|
Merge pull request #19651 from smashery/smb_version_update
Give likely Windows versions for SMB v2-3
|
2024-11-26 09:05:10 -05:00 |
|
Spencer McIntyre
|
530dbd6da1
|
Merge pull request #19678 from smashery/pre2k-ldap-query
Added LDAP query searching for likely Pre-Windows-2000 computers
|
2024-11-25 10:18:49 -05:00 |
|
Ashley Donaldson
|
7f6bdb385d
|
Added LDAP query searching for likely Pre-Windows-2000 computers
|
2024-11-25 12:30:27 +11:00 |
|
jenkins-metasploit
|
d5b71aa581
|
automatic module_metadata_base.json update
|
2024-11-22 14:28:34 +00:00 |
|
Spencer McIntyre
|
502e415344
|
Merge pull request #19630 from remmons-r7/cups_ipp_rce
Exploit module for IPP attributes remote code execution - OpenPrinting CUPS
|
2024-11-22 09:22:21 -05:00 |
|
sfewer-r7
|
68e9b39ffa
|
register teh Rex socket we create via add_socket. This lets teh frameowkr close the socket after we get a session, and will wait up to WfsDelay for that to happen. This lets us remove the other timeout we had, and teh user can always adjust WfsDelay if needed. (Thanks Spencer)
|
2024-11-22 12:42:08 +00:00 |
|
sfewer-r7
|
e5cdf6097d
|
favor File.binread over File.read
|
2024-11-22 12:40:19 +00:00 |
|
sfewer-r7
|
f59bfe98a3
|
remove the default payload and the default fetch command, and let the framework choose them for us.
|
2024-11-22 12:39:34 +00:00 |
|
sfewer-r7
|
2ba112a5a4
|
We can use OptPath here instead of OptString. Also are these are optional, and we dont specify a default, we can omit the nil default value.
|
2024-11-22 12:38:46 +00:00 |
|