Tod Beardsley
e762ca0d9b
Merge remote branch 'jlee-r7/midnitesnake-postgres_payload'
2012-12-12 15:30:56 -06:00
sinn3r
a69a4fbbce
Extra spaces, be gone.
2012-12-12 14:38:00 -06:00
sinn3r
3a481c8e42
Merge branch 'feature/winrm_compat_mode' of git://github.com/dmaloney-r7/metasploit-framework into dmaloney-r7-feature/winrm_compat_mode
2012-12-12 14:31:04 -06:00
David Maloney
5856874cea
Login check fixes for exploit
2012-12-12 14:18:41 -06:00
sinn3r
b465d20d61
Merge branch 'feature/winrm_compat_mode' of git://github.com/dmaloney-r7/metasploit-framework into dmaloney-r7-feature/winrm_compat_mode
2012-12-12 11:59:23 -06:00
David Maloney
5e8b9a20a4
Fix boneheaded mistake
2012-12-12 09:18:03 -06:00
sinn3r
3f4efea879
No twitter name, please.
2012-12-11 14:52:39 -06:00
sinn3r
343a785420
Add OSVDB references
2012-12-11 12:47:08 -06:00
jvazquez-r7
2eb4de815d
added c# code by Nicolas Gregoire
2012-12-11 16:33:41 +01:00
jvazquez-r7
44633c4f5b
deleted incorrect cve ref
2012-12-11 12:16:47 +01:00
jvazquez-r7
fdb457d82b
Merge branch 'refs_update' of https://github.com/wchen-r7/metasploit-framework into wchen-r7-refs_update
2012-12-11 12:16:06 +01:00
sinn3r
b315a4eee4
Grammar
2012-12-11 00:19:15 -06:00
jvazquez-r7
e3a126aa75
Added module for ZDI-10-174
2012-12-11 01:37:44 +01:00
sinn3r
31e2a164a9
MySQL file priv gets a ref from OSVDB
2012-12-10 12:15:44 -06:00
sinn3r
f5193b595c
Update references
2012-12-10 11:42:21 -06:00
David Maloney
e448431c8a
Add 32bit comapt mode for 64 bit targets on wirnm
...
When a 32 bit payload is selected for an x64 target using the powershell
2.0 method,
it will try to invoke the 32bit version of pwoershell to sue instead
allowing us to still get a session even with the wrong payload arch
2012-12-10 11:39:24 -06:00
Tod Beardsley
7ea188e02d
Merge pull request #1147 from wchen-r7/cve_text_consistency
...
Change CVE text format
2012-12-09 14:48:08 -08:00
sinn3r
23d0ffa3ab
Dang it, grammar fail.
2012-12-09 01:39:24 -06:00
sinn3r
64a8b59ff9
Change CVE forma
...
Although the original text should work perfectly, for better
consistency, it's best to remove the "CVE" part. This may not
be a big deal in framework, but stands out a lot in Pro.
2012-12-09 01:09:21 -06:00
sinn3r
811bc49bfd
Merge branch 'bug/rm7593-flash-otf' of git://github.com/jlee-r7/metasploit-framework into jlee-r7-bug/rm7593-flash-otf
2012-12-08 17:16:14 -06:00
jvazquez-r7
d921c6f6e9
bid reference added
2012-12-08 15:09:32 +01:00
jvazquez-r7
080e45045b
Merge branch 'nagios_graph_explorer' of https://github.com/wchen-r7/metasploit-framework into wchen-r7-nagios_graph_explorer
2012-12-08 15:08:57 +01:00
sinn3r
60feba164d
Add OSVDB
2012-12-07 23:18:02 -06:00
sinn3r
15661b82bc
Add Nagios Network Monitor Graph Explorer module
2012-12-07 23:16:25 -06:00
sinn3r
e989142d9d
Merge branch 'freefloat' of git://github.com/wchen-r7/metasploit-framework into wchen-r7-freefloat
2012-12-07 14:48:01 -06:00
sinn3r
78b4233b56
Final changes
2012-12-07 14:44:41 -06:00
jvazquez-r7
bae5442ca6
working...
2012-12-07 21:38:17 +01:00
sinn3r
901ef5060c
Merge branch 'maxthon' of git://github.com/wchen-r7/metasploit-framework into wchen-r7-maxthon
2012-12-07 13:52:23 -06:00
sinn3r
3f1cfcc184
More changes
2012-12-07 13:47:07 -06:00
jvazquez-r7
1aaecbcf0c
cleanup and user agent check
2012-12-07 20:38:08 +01:00
sinn3r
a1336c7b5a
Some more changes
2012-12-07 13:32:44 -06:00
sinn3r
403ac1dc37
I would do anything for a cake.
2012-12-07 13:15:27 -06:00
sinn3r
9838a2c75f
This never works for us. Gonna ditch it.
2012-12-07 13:02:26 -06:00
jvazquez-r7
b0be8dc4df
history exploit cleanup
2012-12-07 19:23:00 +01:00
sinn3r
38f2348c33
First changes
2012-12-07 11:27:09 -06:00
sinn3r
a872362a65
Merge branch 'maxthon3' of git://github.com/malerisch/metasploit-framework into maxthon
2012-12-07 11:17:15 -06:00
sinn3r
2260e4b471
Switch to manual payload selection, because we don't auto-detect
2012-12-07 11:07:11 -06:00
James Lee
8812285678
Move print of my_target.name to after nil check
...
Avoids
"Exception handling request: undefined method `name' for nil:NilClass"
when we don't have a target for the connecting browser.
[FixRM #7593 ]
2012-12-07 11:00:24 -06:00
sinn3r
c08ee695a9
Merge branch 'splunk_upload_app_exec_cleanup' of git://github.com/jvazquez-r7/metasploit-framework into jvazquez-r7-splunk_upload_app_exec_cleanup
2012-12-07 10:46:28 -06:00
sinn3r
fafdcbaae1
Vuln discovered by Rich.
...
See: https://twitter.com/webstersprodigy/status/277087755073380353
2012-12-07 10:42:45 -06:00
jvazquez-r7
e5cc950fe1
fix identation
2012-12-07 11:57:11 +01:00
jvazquez-r7
133ad04452
Cleanup of #1062
2012-12-07 11:55:48 +01:00
sinn3r
bf47eaaa41
Remove code that's commented out. Clearly not needed anymore.
2012-12-06 12:57:41 -06:00
sinn3r
0ea5c781c1
Tabs and spaces don't mix
2012-12-06 12:53:22 -06:00
sinn3r
37f9cff25a
Merge branch 'ibm_director_cim_dllinject' of git://github.com/jvazquez-r7/metasploit-framework into jvazquez-r7-ibm_director_cim_dllinject
2012-12-06 12:36:48 -06:00
jvazquez-r7
fd20998f40
using the primer callback as pointed by egypt
2012-12-06 18:59:46 +01:00
sinn3r
817a7749c1
Merge branch 'ibm_director_cim_dllinject' of git://github.com/jvazquez-r7/metasploit-framework into jvazquez-r7-ibm_director_cim_dllinject
2012-12-06 11:35:09 -06:00
jvazquez-r7
8e21d9e235
fix source_address param
2012-12-06 18:34:22 +01:00
sinn3r
1fb05c0baf
Merge branch 'ibm_director_cim_dllinject' of git://github.com/jvazquez-r7/metasploit-framework into jvazquez-r7-ibm_director_cim_dllinject
2012-12-06 11:34:19 -06:00
Tod Beardsley
215017e17c
Merge remote branch 'wchen-r7/better_tectia_ssh'
2012-12-06 11:01:36 -06:00