Commit Graph

68983 Commits

Author SHA1 Message Date
Jeffrey Martin 1323889b65
update to released Rails 7 supported deps 2023-01-23 09:58:22 -06:00
Jeffrey Martin 5ce04e97e8
update Gemfile dev deps 2023-01-23 09:57:51 -06:00
Jeffrey Martin 149870d8a5
update Ruby version requirement 2023-01-23 09:57:16 -06:00
Jeffrey Martin f78592bf3f
update db/schema.rb for Rails 7 2023-01-23 09:57:16 -06:00
Jeffrey Martin 177f1ec4d8
update that may need guards depending on execution 2023-01-23 09:57:15 -06:00
Jeffrey Martin d9716ebecf
core updates for Rails 7 2023-01-23 09:57:09 -06:00
Spencer McIntyre ed69cb19b2
Land #17520, Remove verbose info in LDAP output
Remove extra info from verbose mode of LDAP output
2023-01-23 09:30:36 -05:00
dwelch-r7 2f6e45af16
Land #17525, Fix deprecation warning in socks proxy 2023-01-23 12:55:04 +00:00
adfoster-r7 20408f4446
Fix deprecation warning in socks proxy 2023-01-23 12:05:57 +00:00
adfoster-r7 414a54886c
Land #17521, Fix up text so we capitalize all words of Metasploit Framework 2023-01-21 00:23:50 +00:00
Grant Willcox dcda0c2ebc
Fix up text so we capitalize all words of Metasploit Framework 2023-01-20 17:05:20 -06:00
Grant Willcox 1975c92e92
Remove extra info from verbose mode of LDAP output 2023-01-20 16:51:34 -06:00
Grant Willcox cd5842e3f4
Land #17340, Warn On Ignoring Bind Information for Reverse Port Forwarding 2023-01-20 14:40:22 -06:00
Spencer McIntyre 81295e40fa
Report the host that's returned from Meterpreter
Report the host that's returned from Meterpreter because that's the most
accurate source of the information.
2023-01-20 14:15:14 -06:00
Spencer McIntyre 729de2478c
Warn that the remote host is ignored 2023-01-20 14:15:13 -06:00
Spencer McIntyre 17d8db43a9
Print IPv6 addresses correctly 2023-01-20 14:15:13 -06:00
Spencer McIntyre 7678e7c8ea
Pass bind address for reverse port forwards 2023-01-20 14:15:13 -06:00
Grant Willcox e537816132
Land #17516, Update metasploit-payloads gem to 2.0.108 2023-01-20 13:55:33 -06:00
Spencer McIntyre 15237e5154 Update metasploit-payloads gem to 2.0.108
Includes changes from:
  * rapid7/metasploit-payloads#599
  * rapid7/metasploit-payloads#600
  * rapid7/metasploit-payloads#602
2023-01-20 09:21:28 -05:00
Metasploit 3602a420d3
Bump version of framework to 6.2.37 2023-01-19 12:05:00 -06:00
Metasploit bca837413f
automatic module_metadata_base.json update 2023-01-19 09:57:30 -06:00
Christophe De La Fuente 1e94adc3ab
Land #17479, Wordpress paid membership pro unauthenticated sqli (CVE-2023-23488) 2023-01-19 15:36:00 +01:00
Spencer McIntyre 0e6ae486d1
Land #17501, Update AD CS spelling
Initial update of ADCS to be AD CS for appropriate spelling
2023-01-19 08:38:46 -05:00
Grant Willcox 82fe7120d4
Update ADCS to be AD CS so we have appropriate spelling 2023-01-18 17:07:48 -06:00
h00die 642e6ee1cb review 2023-01-18 16:21:11 -05:00
Grant Willcox 524ab66d2c
Land #17482, Update min protocol for https server for openssl3 2023-01-18 11:01:32 -06:00
adfoster-r7 77b0fcb2f5
Update min protocol for https server for openssl3 2023-01-18 10:59:26 -06:00
Grant Willcox c0ddead75f
Land #17480, Add payload exploit command 2023-01-17 17:52:32 -06:00
Grant Willcox b8bea10296
Land #17491, Fix LDAP Failure References 2023-01-17 17:22:10 -06:00
Metasploit 69464b3df2
automatic module_metadata_base.json update 2023-01-17 17:17:21 -06:00
bwatters 607dd9f081
Land #17348, New exploit for CVE-2022-46770 Mirage firewall DoS
Merge branch 'land-17348' into upstream-master
2023-01-17 16:52:38 -06:00
adfoster-r7 235888b77e
Land #17492, Remove CI crash example from Docs 2023-01-17 22:47:10 +00:00
bwatters 470972b91d
Land #17385, Return success code for writing and appending file in command shells 2023-01-17 16:37:06 -06:00
Spencer McIntyre d810267f8d
Pull in Dean's changes from #17443 to fix LDAP failure references. 2023-01-17 16:31:08 -06:00
Grant Willcox 43d4a3ca7e
Remove CI crash example since its unneeded and extra overhead to maintain 2023-01-17 16:04:46 -06:00
Metasploit 5dee00be0c
automatic module_metadata_base.json update 2023-01-17 13:33:02 -06:00
Grant Willcox 3b1380b164
Land #17449, Ivanti Cloud Services Appliance unauthenticated cookie-based command injection [CVE-2021-44529] 2023-01-17 13:08:12 -06:00
Grant Willcox 7e23c34e6c
Apply fixes per code review 2023-01-17 12:44:22 -06:00
h00die-gr3y 541dab9365
simplified messaging 2023-01-17 12:44:20 -06:00
h00die-gr3y da3ae22135
added documentation 2023-01-17 12:44:20 -06:00
h00die-gr3y 77687bff3f
init module 2023-01-17 12:44:20 -06:00
adfoster-r7 d8cf034d70
Land #17488, Remove references to Travis CI 2023-01-17 17:20:44 +00:00
Grant Willcox aceb4c57c6
Remove references to Travis CI since we no longer use it and now use GitHub Actions 2023-01-17 10:28:21 -06:00
Metasploit c429113f5e
automatic module_metadata_base.json update 2023-01-17 08:23:26 -06:00
Spencer McIntyre a10e313e26
Land #17343, unquoted service path tweaks 2023-01-17 08:59:37 -05:00
Metasploit da22f18256
automatic module_metadata_base.json update 2023-01-16 14:17:56 -06:00
Christophe De La Fuente 0c8e83c34e
Land #17451, Crack netntlm* 2023-01-16 20:52:53 +01:00
adfoster-r7 5b3db9abc0
Update min protocol for https server for openssl3 2023-01-15 14:08:26 +00:00
h00die a28b203f73 payload exploit command 2023-01-15 05:38:15 -05:00
h00die 1888264d4d wordpress paid membership pro 2023-01-14 08:34:10 -05:00