Erin Bleiweiss
|
5055e421f5
|
Add ! to cred update
|
2019-01-10 10:56:28 -06:00 |
Erin Bleiweiss
|
0ad89528ea
|
Update pattern for creds
|
2019-01-10 10:55:36 -06:00 |
Erin Bleiweiss
|
cfa22bb4ec
|
Exclude key from VulnDetail update
|
2019-01-07 16:33:50 -06:00 |
Erin Bleiweiss
|
771469f4cd
|
Update all Mdm::xx.update() instances
|
2019-01-07 16:24:13 -06:00 |
William Vu
|
f96514528b
|
Land #10648, auth bypass for couchdb_enum
|
2019-01-07 12:53:11 -06:00 |
William Vu
|
3a726554e9
|
Fix review comments
|
2019-01-07 12:51:52 -06:00 |
Matthew Kienow
|
b5c4ac6af3
|
Land #11113, fixes for vuln and credential APIs
|
2019-01-04 17:05:12 -05:00 |
Metasploit
|
9ac96b213f
|
Weekly dependency update
|
2019-01-04 14:00:12 -08:00 |
James Barnett
|
1b29e17827
|
Dont array wrap refs
|
2019-01-04 15:10:21 -06:00 |
James Barnett
|
b875d391fc
|
WIP: updating ref lookup based on code review comments
|
2019-01-04 15:10:20 -06:00 |
James Barnett
|
5f43ec0a79
|
Address code review comment
|
2019-01-04 15:10:20 -06:00 |
James Barnett
|
81f877ad09
|
Remove doc references to Mdm::Module::Ref
It doesnt look like this ever gets set anywhere. Mdm::Vuln.refs
seems to have replaced it
|
2019-01-04 15:10:20 -06:00 |
James Barnett
|
0281ddf78c
|
Remove vuln_refs from Vuln JSON schema
This object is just a pointer between Vulns and refs. We don't need to surface it
|
2019-01-04 15:10:20 -06:00 |
James Barnett
|
10cceb0e9b
|
Fix a couple of bugs introduced by symbolizing to_ar
|
2019-01-04 15:10:20 -06:00 |
James Barnett
|
e9931fa70e
|
Fix bug when updating Mdm::Vuln.refs
|
2019-01-04 15:10:19 -06:00 |
James Barnett
|
bcfe434d1e
|
Update to_ar to use symbolized keys
|
2019-01-04 15:10:19 -06:00 |
Brent Cook
|
260bfdc071
|
Land #11195, update travis to use latest rubygems
|
2019-01-04 06:00:39 -06:00 |
Jeffrey Martin
|
7faca5e4c5
|
update travis to use latest rubygems
By using the latest rubygems available bundler version
limits should become more compatible.
|
2019-01-03 13:50:48 -06:00 |
Adam Cammack
|
0d6ef39fac
|
Land #11194, Pin Travis CI bundler to 1.17.3
|
2019-01-03 13:42:07 -06:00 |
Jeffrey Martin
|
3c123d93f9
|
set bundler version for travis for now
|
2019-01-03 13:23:16 -06:00 |
Brent Cook
|
e990bb31df
|
Land #11182, bump mettle, change debug and background options
|
2019-01-03 02:57:19 -06:00 |
William Vu
|
cfec99b1a8
|
Land #11154, tab completion for aux rerun/exploit
|
2019-01-02 18:44:04 -06:00 |
Metasploit
|
e1c6799076
|
automatic module_metadata_base.json update
|
2018-12-29 02:22:55 -08:00 |
Brendan Coles
|
5957315167
|
Land #11141, Ensure Byte XORi Encoder uses cacheflush()
|
2018-12-29 10:20:07 +00:00 |
Brendan Coles
|
005b2664b8
|
Land #11140, Ensure MIPS Long XOR Encoder uses cacheflush()
|
2018-12-29 10:14:47 +00:00 |
bwatters
|
9e109c7e7c
|
Update cache size
|
2018-12-28 16:08:15 -06:00 |
bwatters
|
c6e83d109d
|
Update Gemfile.lock with mettle 0.5.1
|
2018-12-28 15:45:33 -06:00 |
bwatters
|
f81c11bbe5
|
Update gemspec to mettle 0.5.1
|
2018-12-28 15:44:42 -06:00 |
Metasploit
|
2418dcf6aa
|
automatic module_metadata_base.json update
|
2018-12-28 07:22:50 -08:00 |
Shelby Pace
|
29e7c49332
|
Land #10444, add Consul rexec RCE module
|
2018-12-28 09:14:28 -06:00 |
Shelby Pace
|
b1ad271cb8
|
fixed link
|
2018-12-28 09:12:31 -06:00 |
Metasploit
|
8cfc16ce4e
|
automatic module_metadata_base.json update
|
2018-12-28 06:50:05 -08:00 |
Shelby Pace
|
fb8f06b2f5
|
Land #10443, add Consul service RCE module
|
2018-12-28 08:33:56 -06:00 |
Metasploit
|
a7e44e39f1
|
Weekly dependency update
|
2018-12-27 10:05:39 -08:00 |
Brent Cook
|
66505790f9
|
Land #11179, Replace Sysrandom with Ruby default SecureRandom
|
2018-12-27 11:33:29 -06:00 |
Brent Cook
|
0d0356ccdd
|
Land #11126, Update sessions through the DBManager
|
2018-12-26 13:15:43 -06:00 |
Matthew Kienow
|
ebc7a3a315
|
Replace sysrandom with ruby default securerandom
|
2018-12-26 13:40:44 -05:00 |
Metasploit
|
10be720843
|
automatic module_metadata_base.json update
|
2018-12-25 19:45:11 -08:00 |
Green-m
|
69e7956adf
|
Land #11174, Fix platform bug when upgrade shell.
The platform on windows powershell should be 'win', rather than
'windows', this bug leads to failure when upgrade powershell session
to meterpreter.
|
2018-12-26 11:31:39 +08:00 |
L
|
ee7120d63a
|
fixed post/multi/manage/shell_to_meterpreter
|
2018-12-25 15:00:39 +08:00 |
Quentin Kaiser
|
53a3caba2b
|
List the vulnerable application and versions affected + cleaner cleanup script.
|
2018-12-24 13:54:02 +01:00 |
Quentin Kaiser
|
18c844623a
|
Remove extra spaces.
|
2018-12-24 13:48:07 +01:00 |
Quentin Kaiser
|
b9d4a46972
|
And the output that corresponds to the new script.
|
2018-12-24 13:42:25 +01:00 |
Quentin Kaiser
|
46ee2a6c94
|
Add vulnerable version information + new reference regarding this exact vulnerability.
|
2018-12-24 13:40:12 +01:00 |
Quentin Kaiser
|
e10792f4e6
|
Remove extra space.
|
2018-12-24 13:30:03 +01:00 |
Green-m
|
12a948dde5
|
Move down cmd_rerun to fix rspec issue.
|
2018-12-24 11:30:02 +08:00 |
Metasploit
|
a457973702
|
automatic module_metadata_base.json update
|
2018-12-21 15:14:24 -08:00 |
Brent Cook
|
b9742802aa
|
Land #11137, Clean up linux/local/vmware_alsa_config exploit module
|
2018-12-21 17:04:11 -06:00 |
Brent Cook
|
af60cb642e
|
Land #11038, add REG_MULTI_SZ support for Meterpreter registry reads
|
2018-12-21 17:00:16 -06:00 |
Brent Cook
|
69d882eb54
|
bump payloads with REG_MULTI_SZ support
|
2018-12-21 16:53:51 -06:00 |