Files
metasploit-gs/lib/msf/core
RageLtMan d7ba37d2e6 Msf::Exploit::Remote::HttpServer print_* fix
Exploit::Remote::HttpServer and every descendant utilizes the
print_prefix method which checks whether the module which mixes in
these modules is aggressive. This is done in a proc context most
of the time since its a callback on the underlying Rex HTTP server.

When modules do not define :aggressive? the resulting exceptions
are quietly swallowed, and requestors get an empty response as the
client object dies off.

Add check for response to :aggressive? in :print_prefix to address
this issue.
2016-02-21 20:20:22 -05:00
..
2016-01-14 10:04:23 -06:00
2015-12-24 12:21:08 +00:00
2015-10-22 16:07:38 -05:00
2015-04-13 13:21:41 +05:00
2015-04-13 13:21:41 +05:00
2015-04-13 13:21:41 +05:00
2015-04-13 13:21:41 +05:00
2015-04-13 13:21:41 +05:00
2015-04-13 13:21:41 +05:00
2015-09-14 12:18:47 -05:00
2015-06-16 19:42:32 +01:00
2015-04-20 15:54:41 -05:00
2015-12-22 16:06:01 +00:00
2015-04-21 11:14:03 -05:00
2015-09-10 19:35:26 -05:00
2015-06-19 21:28:47 +01:00