James Lee
|
1375600780
|
Land #6644, datastore validation on assignment
|
2016-03-17 11:16:12 -05:00 |
|
Christian Mehlmauer
|
3123175ac7
|
use MetasploitModule as a class name
|
2016-03-08 14:02:44 +01:00 |
|
Brent Cook
|
44990e9721
|
Revert "change Metasploit4 class names"
This reverts commit 3da9535e22.
|
2016-03-07 13:19:48 -06:00 |
|
Christian Mehlmauer
|
3da9535e22
|
change Metasploit4 class names
|
2016-03-07 09:57:22 +01:00 |
|
Brent Cook
|
c7c0e12bb3
|
remove various module hacks for the datastore defaults not preserving types
|
2016-03-05 23:11:39 -06:00 |
|
James Lee
|
12256a6423
|
Remove now-redundant peer
These all include either Msf::Exploit::Remote:Tcp or Msf::Exploit::Remote:HttpClient
|
2016-02-01 15:12:03 -06:00 |
|
HD Moore
|
16d0d53150
|
Update Shellshock modules, add Advantech coverage
|
2015-12-01 10:40:46 -06:00 |
|
HD Moore
|
f86f427d54
|
Move Compat into Payload so that is actually used
|
2015-11-09 16:06:05 -06:00 |
|
jvazquez-r7
|
203c231b74
|
Fix #5659: Update CMD exploits payload compatibility options
|
2015-08-10 17:12:59 -05:00 |
|
Tod Beardsley
|
51b96cb85b
|
Cosmetic title/desc updates
|
2014-11-03 13:37:45 -06:00 |
|
Brendan Coles
|
57baf0f393
|
Add support for CVE-2014-6278
|
2014-10-28 17:10:19 +00:00 |
|
Brendan Coles
|
78b199fe72
|
Remove CVE-2014-6278
|
2014-10-28 16:18:24 +00:00 |
|
Brendan Coles
|
a060fec760
|
Detect version in check()
|
2014-10-28 12:28:18 +00:00 |
|
Brendan Coles
|
554935e60b
|
Add check() and support CVE-2014-6278
|
2014-10-26 18:11:36 +00:00 |
|
Brendan Coles
|
0ede70e7f6
|
Add exploit module for CUPS shellshock
|
2014-10-19 17:58:49 +00:00 |
|