This website requires JavaScript.
Explore
Help
Sign In
adam
/
metasploit-gs
Watch
1
Star
0
Fork
0
You've already forked metasploit-gs
Code
Issues
Pull Requests
Actions
Packages
Projects
Releases
Wiki
Activity
Files
4d85602fae1cd6c1050706757e60d964acacb97f
metasploit-gs
/
documentation
/
modules
/
exploit
T
History
William Vu
4d85602fae
Fix incorrect scenario header in module doc
...
I retested in VirtualBox and updated the output but not the header.
2020-12-18 21:15:05 -06:00
..
aix
/local
Update documents with vimeo video example and update SideEffects value
2019-11-11 14:28:07 -06:00
android
/local
Land
#12465
, add Android Binder UAF (CVE-2019-2215)
2020-02-23 01:06:33 -08:00
apple_ios
/browser
add docs to safari jit
2020-08-14 14:14:08 +07:00
bsd
/finger
Update my module documentation to the new standard
2020-04-20 20:06:52 -05:00
freebsd
/local
Use Msf::Exploit::Remote::AutoCheck
2020-07-26 08:04:37 +00:00
linux
Land
#14368
, Pulse Connect Secure gzip RCE: cve-2020-8260
2020-12-17 17:43:55 -05:00
mainframe
/ftp
Added Bind Shell JCL Payload for mainframe
2017-09-29 16:52:36 -05:00
multi
Land
#14509
, Fixes for Solr RCE
2020-12-18 21:51:06 +01:00
openbsd
/local
Add OpenBSD Dynamic Loader chpass Privilege Escalation (CVE-2019-19726)
2019-12-22 08:46:43 +00:00
osx
Land
#13996
, Add module for CVE-2020-9801, CVE-2020-9850 and CVE-2020-9856,
2020-10-01 09:46:39 -05:00
qnx
/local
Update tested versions
2018-03-24 00:19:30 +00:00
solaris
Fix incorrect scenario header in module doc
2020-12-18 21:15:05 -06:00
unix
Land
#14241
, OpenMediaVault 5.5.11 Authenticated Remote Code Execution
2020-11-24 13:42:53 -06:00
windows
Fix
#14254
, Add CVE-2020-1054, win32k DrawIconEx OOB Write LPE
2020-12-14 14:54:54 +00:00