Commit Graph

51410 Commits (cf7096f8ba899a93c254f9e83417865257681d1a)

Author SHA1 Message Date
Metasploit 0c7e589db8
automatic module_metadata_base.json update 2019-04-04 13:32:00 -07:00
Shelby Pace fff129ae9f
Land #11587, add Wordpress core RCE module 2019-04-04 15:22:56 -05:00
Shelby Pace 6efd80e139
added note in info 2019-04-04 15:19:58 -05:00
Shelby Pace 2884d9afcb
modified checks, added function 2019-04-04 15:09:12 -05:00
Metasploit 2710c422c2
Bump version of framework to 5.0.16 2019-04-04 10:08:31 -07:00
ct5595 8786150bdf Added functionality for OVERRIDE_CONFIG option 2019-04-04 10:43:08 -04:00
ct5595 b5449b7035 Added OVERRIDE_CONFIG option to cisco_upload_file.rb 2019-04-04 09:47:42 -04:00
Metasploit 45752affd0
automatic module_metadata_base.json update 2019-04-03 17:29:13 -07:00
William Vu a2165a2954
Land #11685, proper XML encoding for Wemo exploit 2019-04-03 19:20:43 -05:00
William Vu e164c2350c Properly encode command input with XML entities
REXML would make this less ghetto.
2019-04-03 19:10:27 -05:00
Shelby Pace d5ac1e3a33
minor adjustments to indentation and requests 2019-04-03 19:03:47 -05:00
Metasploit 40a3f3c24f
automatic module_metadata_base.json update 2019-04-03 12:51:31 -07:00
Adam Cammack de6397445c
Land #11681, Remove trailing space in metadata 2019-04-03 14:34:41 -05:00
Javan Rasokat 8350effaa5
Fixed wrong check (did never work)
* HOST was always localhost 
* Now sends both Range and the legacy 'Request-Range'
TODO: Method HEAD is not always sufficient, should be editable
2019-04-03 16:23:58 +02:00
Ben Schmeckpeper 7d1f6afd4a Remove trailing space from CVE reference 2019-04-03 09:21:55 -05:00
Metasploit ced68536ab
automatic module_metadata_base.json update 2019-04-02 13:04:27 -07:00
William Vu bc4857954e
Land #11679, duplicate mailcleaner_exec CVE fix 2019-04-02 14:55:36 -05:00
todb-r7 9e3984ea51
Remove duplicate CVE for Mailcleaner module
See #11304
2019-04-02 12:51:09 -05:00
Brent Cook 94eb039bd3
Land #11677, add missing payload specs 2019-04-02 07:23:16 -05:00
wilfried 3081b13a1f Adding payload in exploit code 2019-04-02 10:24:48 +02:00
Metasploit 46535074f6
automatic module_metadata_base.json update 2019-04-01 16:24:03 -07:00
Jeffrey Martin a53ce7539d
add missing payload specs 2019-04-01 18:23:52 -05:00
surefire 1b6cd64016 Land #11136, exploit/multi/misc/weblogic_deserialize_unicastref 2019-04-01 18:15:26 -05:00
surefire 40191e5a01 Dissected JSOs, randomized strings, copied T3 header breakdown from @acamro 2019-04-01 18:05:45 -05:00
Jacob Robles 3d662bd962
Fix words because words... 2019-04-01 17:21:23 -05:00
Jacob Robles 69062bb220
Syntax fixes 2019-04-01 17:05:42 -05:00
Metasploit 601719f0e8
automatic module_metadata_base.json update 2019-04-01 14:07:11 -07:00
William Vu 06397bb087
Land #11636, postgres_createlang version check fix 2019-04-01 15:21:57 -05:00
Metasploit 3318f52524
automatic module_metadata_base.json update 2019-04-01 12:20:28 -07:00
surefire f292befed4 Land #11134, exploit/multi/misc/weblogic_serialize_marshalledobject 2019-04-01 14:11:30 -05:00
surefire 4d0e47044b Fixed a hardcoded payload length resulting in 40% failures 2019-04-01 14:05:39 -05:00
Brendan Coles ddbd7ba080 Case insensitive match 2019-04-01 18:58:14 +00:00
Metasploit 66a6b61441
automatic module_metadata_base.json update 2019-04-01 10:47:23 -07:00
William Vu 5867158238
Land #11595, can_flood post module 2019-04-01 12:38:46 -05:00
William Vu f5f4c4bec2 Clean up module 2019-04-01 12:24:35 -05:00
Jacob Robles c07b015734
File cleanup 2019-04-01 11:39:40 -05:00
William Vu 36deeceae9
Land #11652, search -u to use first search result 2019-04-01 11:30:30 -05:00
William Vu e577b8f46a Prefer print_status for status message 2019-04-01 11:30:11 -05:00
BrennerLittle 58be84b3b8
Create microsoft_windows_contact_remote_code_execution.md
added documentation
2019-04-01 09:55:03 -05:00
Jacob Robles 51d1216953
Update module name 2019-04-01 07:48:26 -05:00
Jacob Robles 7441cd7fa3
Add Zimbra Doc 2019-04-01 07:33:27 -05:00
Jacob Robles 0873ba7ac1
Add Zimbra XXE to RCE module 2019-04-01 07:32:57 -05:00
BrennerLittle e733d225b6
microsoft_windows_contact_remote_code_execution 2019-03-31 11:12:09 -05:00
Brent Cook edca25d277 remove search 'use by number' option, only use if there is one match 2019-03-30 20:01:40 -05:00
PietroBiondi 2afd27a671 1)Fixed documentation format 2)Refactoring and more efficient loop 2019-03-30 17:12:15 +01:00
RatioSec Research 80ca30dc49 Apply fix requests on documentation 2019-03-30 10:19:55 +00:00
William Vu 496f270b30 Update use_single_quotes to wrap_double_quotes 2019-03-29 18:14:56 -05:00
Metasploit d3f30297dd
automatic module_metadata_base.json update 2019-03-29 14:30:54 -07:00
Brent Cook 82b7c926fe
Land #11579, Add support for splunk 7.2.4 to splunk_upload_app_exec 2019-03-29 16:22:26 -05:00
Metasploit 795cc90586
automatic module_metadata_base.json update 2019-03-29 13:54:37 -07:00