adfoster-r7
085943bd78
Add Ruby 3.3.0-preview1 to test suite
2023-06-29 22:53:17 +01:00
adfoster-r7
d04c8e1bce
Update broken secunia references
2023-03-23 10:43:57 +00:00
Grant Willcox
a075c676a6
Fix spacing issue
2022-06-10 08:47:41 -05:00
dwelch-r7
3f06e237b7
Correctly format the notes sections
2022-06-10 14:01:57 +01:00
sjanusz
bbf9e3163a
Fix file reads on Windows for binary files
2022-03-21 12:47:39 +00:00
h00die
d5ba1afbec
fix URLs not resolving
...
fix URLs not resolving
add csv export to references
fix URLs not resolving
pdf not pd
missed a url change
remove extra recirectedfrom fields
remove extra file
fix ovftool url accidental replacement
2022-02-16 17:22:40 -06:00
adfoster-r7
28eab4d871
Add Meterpreter compatibility metadata
2021-10-06 13:54:51 +01:00
adfoster-r7
46718e3390
Run Rubocop layout rules on modules
2021-09-10 12:53:39 +01:00
William Vu
4020813b42
Correct broken or redundant CVE references
2021-04-05 13:06:50 -05:00
dwelch-r7
319f15d938
Handle nil versions for rubygems 4
2021-02-25 16:47:49 +00:00
dwelch-r7
d437a32374
remove msf/util requires
2021-01-18 14:21:54 +00:00
dwelch-r7
1617b3ec9b
Use zeitwerk for lib/msf/core folder
2020-12-07 10:31:45 +00:00
Alan Foster
30809787c4
Convert disclosure dates to iso8601
2020-10-02 21:00:37 +01:00
Alan Foster
af9d2a28de
Fix msftidy warnings
2020-02-26 14:56:08 +00:00
Brent Cook
9aac803f41
remove a scratchpad line I saved while testing blog link fixes
2020-02-18 09:26:29 -06:00
Brent Cook
8489bcdfd9
This fixes broken links to the community.rapid7.com blog
...
Performed mechanically with sed, spot-checked that the new blog can consume these links.
2020-02-18 09:06:11 -06:00
Adam Cammack
cf9b94a964
Set needs_cleanup flag for exploits that need it
...
The `needs_cleanup` flag needs to be set per-module when an exploit
needs an interactive session to clean up. Some `FileDropper` exploits
need additional cleanup to what the mixin provides, but since all
`FileDropper`s already mark themselves as needing cleanup those are not
covered here. A few of these could potentially be refactored to use the
original exploitation method to clean up or to compile the list of
files/commands to clean up ahead of time, but that is out of the scope
of this fix.
2019-08-02 10:23:53 -05:00
Jacob Robles
1fe981b8e2
Land #11843 , Update MSB references
2019-05-23 08:07:46 -05:00
Jacob Robles
db353a7ba1
Fix MS reference number
2019-05-23 07:03:23 -05:00
Jacob Robles
a0e90c0848
Remove references to doc.microsoft.com bulletin
...
MSB references point to this location
2019-05-23 07:01:21 -05:00
7echSec
328b4fa860
Addressing Syntax error
2019-05-16 21:06:47 +05:30
7echSec
c947cd76f6
Removed register_advanced_options
...
Added 'Powershell::wrap_double_quotes' => false in DefaultOptions.
2019-05-16 14:19:52 +05:30
PierrickV
94f904311b
Fix broken links mostly to Microsoft website
2019-05-16 09:50:19 +02:00
7echSec
053ceed171
Regression fix: Disabling wrap_double_quotes
...
This client side exploit stopped working in current MSF throws an error in client browser.As per the analysis its because of Powershell::wrap_double_quotes=true.
I have just Added "Powershell::wrap_double_quotes" as advance option to override Datastore value.
2019-05-16 12:39:42 +05:30
Wei Chen
923d8b8b2e
Fix uri with get_resource
2019-05-08 11:20:36 -05:00
Tim W
39969e71fa
Initial commit of CVE-2019-5786
2019-05-06 17:05:00 +08:00
Jacob Robles
b31afb4e3d
Spaces at EOL fixes
2018-11-29 17:29:05 -06:00
Wei Chen
8e442cc980
Update documenation
2018-10-15 15:45:39 -05:00
Wei Chen
b0313dd25c
Update getgodm_http_response_bof for proper auto targets
2018-10-15 15:25:55 -05:00
Wei Chen
ff9f3ed9ff
Add support for v5
2018-10-15 15:14:12 -05:00
Wei Chen
5433d2cca9
Sync up upstream master
2018-10-15 14:19:07 -05:00
Fabio Poloni
4927f96f61
Fixed small typo
2018-10-02 15:57:57 +02:00
William Vu
4c036e70c1
Fix http://seclists.org links to https://
...
I have no idea how this happened in my own code. I was seeing https://.
2018-09-15 18:54:45 -05:00
Ben Schmeckpeper
c4d697a629
Remove trailing space from CVE identifier
...
ASUS Net4Switch ipswcom exploit mistakenly included a trailing space at the end of its CVE reference.
2018-08-29 14:12:49 -05:00
asoto-r7
1a3a4ef5e4
Revised 88 aux and exploit modules to add CVEs / references
2018-07-12 17:34:52 -05:00
Auxilus
ad7a2418df
move exploit to windows/browser
2018-03-03 01:35:25 +05:30
Daniel Teixeira
c84ece15a3
Update exodus.rb
2018-02-28 11:04:16 +00:00
Daniel Teixeira
c366f94017
Update exodus.rb
2018-02-28 10:35:05 +00:00
Daniel Teixeira
15bd45cee3
Exodus Module
2018-02-26 21:31:13 +00:00
Patrick Webster
2f6da89674
Change author name to nick.
2017-11-09 03:00:24 +11:00
Kent Gruber
7cd532c384
Change targetr to target to fix small typo bug on one failure
...
The target object seems to have a typo where it is referred to as
“targetr” which I’d guess isn’t exactly what we’d like to do in this
case. So, I’ve changed that to “target” in order to work.
So, I’ve simply fixed that small typo.
2017-10-19 19:55:58 -04:00
Brent Cook
9d2e8b1e4d
Land #8003 , Evasions for delivering nops/shellcode into memory
2017-10-05 16:44:36 -05:00
Pearce Barry
8de6fa79c1
Tweakz, yo.
2017-09-22 18:49:09 -05:00
h00die
30f833f684
80 pages left
2017-09-13 22:03:34 -04:00
Tod Beardsley
cfbd3c1615
Fix spelling of Honeywell
2017-09-11 13:02:18 -05:00
h00die
7339658ba9
224 pages of spelling issues left
2017-09-09 09:52:08 -04:00
h00die
0910c482a9
35 pages of spelling done
2017-09-08 22:19:55 -04:00
Brent Cook
6300758c46
use https for metaploit.com links
2017-07-24 06:26:21 -07:00
Brent Cook
80d18fae6a
update example modules to have zero violations
2017-07-24 06:15:54 -07:00
Brent Cook
838b066abe
Merge branch 'master' into land-8716
2017-07-24 05:51:44 -07:00