jvazquez-r7
|
47bff9a416
|
Land #2711, @Mekanismen exploit for wordpress OptimizePress theme
|
2013-12-02 16:30:24 -06:00 |
jvazquez-r7
|
5c3ca1c8ec
|
Fix title
|
2013-12-02 16:30:01 -06:00 |
jvazquez-r7
|
c32b734680
|
Fix regex
|
2013-12-02 16:24:21 -06:00 |
Tod Beardsley
|
55847ce074
|
Fixup for release
Notably, adds a description for the module landed in #2709.
|
2013-12-02 16:19:05 -06:00 |
jvazquez-r7
|
79a6f8c2ea
|
Clean php_wordpress_optimizepress
|
2013-12-02 15:43:41 -06:00 |
Mekanismen
|
57b7d89f4d
|
Updated
|
2013-12-01 09:06:41 +01:00 |
Mekanismen
|
045b848a30
|
added exploit module for optimizepress
|
2013-11-30 21:51:56 +01:00 |
sinn3r
|
a02e0ee3e4
|
Land #2682 - Kimai v0.9.2 'db_restore.php' SQL Injection
|
2013-11-27 19:10:44 -06:00 |
bcoles
|
a03cfce74c
|
Add table prefix and doc root as fallback options
|
2013-11-25 17:44:26 +10:30 |
bcoles
|
d8700314e7
|
Add Kimai v0.9.2 'db_restore.php' SQL Injection module
|
2013-11-24 02:32:16 +10:30 |
William Vu
|
2c485c509e
|
Fix caps on module titles (first pass)
|
2013-11-15 00:03:42 -06:00 |
Tod Beardsley
|
65993704c3
|
Actually commit the mode change.
|
2013-11-11 22:16:29 -06:00 |
jvazquez-r7
|
bdba80c05c
|
Land #2569, @averagesecurityguy and others exploit for CVE-2013-4468, CVE-2013-4467
|
2013-11-07 12:20:42 -06:00 |
jvazquez-r7
|
2d4090d9c3
|
Make option astGUIclient credentials
|
2013-11-06 20:33:47 -06:00 |
jvazquez-r7
|
24d22c96a5
|
Improve exploitation
|
2013-11-06 20:15:40 -06:00 |
jvazquez-r7
|
2b2ec1a576
|
Change module location
|
2013-11-06 15:53:45 -06:00 |
William Vu
|
f5d1d8eace
|
chmod -x .rb files without #! in modules and lib
It wasn't just cmdstager_printf.rb. :/
|
2013-10-30 19:51:25 -05:00 |
jvazquez-r7
|
2ef33aabe7
|
Clean open_flash_chart_upload_exec
|
2013-10-24 10:15:28 -05:00 |
bcoles
|
8a5d4d45b4
|
Add Open Flash Chart v2 Arbitrary File Upload exploit
|
2013-10-24 22:46:41 +10:30 |
sinn3r
|
1599d1171d
|
Land #2558 - Release fixes
|
2013-10-21 13:48:11 -05:00 |
Tod Beardsley
|
c070108da6
|
Release-related updates
* Lua is not an acronym
* Adds an OSVDB ref
* credit @jvazquez-r7, not HD, for the Windows CMD thing
|
2013-10-21 13:33:00 -05:00 |
sinn3r
|
032da9be10
|
Land #2426 - make use of Msf::Config.data_directory
|
2013-10-21 13:07:33 -05:00 |
Tod Beardsley
|
22b4bf2e94
|
Resplat webtester_exec.rb
|
2013-10-17 13:30:54 -05:00 |
Tod Beardsley
|
07ab53ab39
|
Merge from master to clear conflict
Conflicts:
modules/exploits/windows/brightstor/tape_engine_8A.rb
modules/exploits/windows/fileformat/a-pdf_wav_to_mp3.rb
|
2013-10-17 13:29:24 -05:00 |
jvazquez-r7
|
352eca1147
|
Fix check method and set a big space available for payload
|
2013-10-17 09:30:59 -05:00 |
bcoles
|
54cf7855a2
|
Add WebTester 5.x Command Execution exploit module
|
2013-10-17 16:57:57 +10:30 |
Tod Beardsley
|
ed0b84b7f7
|
Another round of re-splatting.
|
2013-10-15 14:14:15 -05:00 |
Tod Beardsley
|
c83262f4bd
|
Resplat another common boilerplate.
|
2013-10-15 14:07:48 -05:00 |
Tod Beardsley
|
23d058067a
|
Redo the boilerplate / splat
[SeeRM #8496]
|
2013-10-15 13:51:57 -05:00 |
joev
|
e2a9339592
|
Add CVE to joomla media upload module.
|
2013-10-12 21:20:11 -05:00 |
Meatballs
|
9ca9b4ab29
|
Merge branch 'master' into data_dir
Conflicts:
lib/msf/core/auxiliary/jtr.rb
|
2013-10-10 19:55:26 +01:00 |
jvazquez-r7
|
52574b09cb
|
Add OSVDB reference
|
2013-10-09 14:13:45 -05:00 |
jvazquez-r7
|
24efb55ba9
|
Clean flashchat_upload_exec
|
2013-10-05 14:50:51 -05:00 |
bcoles
|
08243b277a
|
Add FlashChat Arbitrary File Upload exploit module
|
2013-10-05 22:30:38 +09:30 |
jvazquez-r7
|
299dfe73f1
|
Land #2460, @xistence's exploit for clipbucket
|
2013-10-04 12:26:30 -05:00 |
jvazquez-r7
|
8e0a4e08a2
|
Fix author order
|
2013-10-04 12:25:38 -05:00 |
xistence
|
81d4a8b8c1
|
added clipbucket_upload_exec RCE
|
2013-10-04 11:43:38 +07:00 |
Meatballs
|
c460f943f7
|
Merge branch 'master' into data_dir
Conflicts:
modules/exploits/windows/local/always_install_elevated.rb
plugins/sounds.rb
scripts/meterpreter/powerdump.rb
scripts/shell/spawn_meterpreter.rb
|
2013-10-02 20:17:11 +01:00 |
sinn3r
|
23b0c3b723
|
Add Metasploit blog references
These modules have blogs from the Rapid7 community, we should add them.
|
2013-10-01 20:50:16 -05:00 |
sinn3r
|
7118f7dc4c
|
Land #2422 - rm methods peer & rport
Because they're already defined in the HttpClient mixin
|
2013-09-30 16:01:59 -05:00 |
Tab Assassin
|
2e8d19edcf
|
Retab all the things (except external/)
|
2013-09-30 13:47:53 -05:00 |
Meatballs
|
7ba846ca24
|
Find and replace
|
2013-09-26 20:34:48 +01:00 |
FireFart
|
84ec2cbf11
|
remove peer methods since it is already defined in Msf::Exploit::Remote::HttpClient
|
2013-09-25 23:42:44 +02:00 |
jvazquez-r7
|
58d4096e0f
|
Resolv conflicts on #2267
|
2013-09-25 13:06:14 -05:00 |
jvazquez-r7
|
a50ab1ddd3
|
Land #2409, @xistence exploit for ZeroShell
|
2013-09-24 15:32:55 -05:00 |
jvazquez-r7
|
6c2063c9c0
|
Do not get a session on every execute_command call
|
2013-09-24 15:31:40 -05:00 |
jvazquez-r7
|
79ca123051
|
Use snake_case
|
2013-09-24 15:16:51 -05:00 |
jvazquez-r7
|
34b84395c1
|
Fix References field
|
2013-09-24 15:16:02 -05:00 |
jvazquez-r7
|
adfacfbed1
|
Do not fail_with on method used from check
|
2013-09-24 15:08:48 -05:00 |
jvazquez-r7
|
4b6a646899
|
Fix typo
|
2013-09-24 15:06:35 -05:00 |