UPDATE: security/metasploit 6.3.32 -> 6.3.34
This commit is contained in:
parent
64d51ccae6
commit
57b29061b0
4 changed files with 98 additions and 35 deletions
|
@ -1,6 +1,6 @@
|
|||
COMMENT= metasploit framework
|
||||
|
||||
VERSION= 6.3.32
|
||||
VERSION= 6.3.34
|
||||
DISTNAME= metasploit-framework-${VERSION}
|
||||
DISTFILES= ${VERSION}.tar.gz
|
||||
|
||||
|
|
|
@ -1,2 +1,2 @@
|
|||
SHA256 (6.3.32.tar.gz) = ltIXl4WZS9f+zNwXYy7Q3A5hE0SLOon2OkQgJUxAA9M=
|
||||
SIZE (6.3.32.tar.gz) = 72544867
|
||||
SHA256 (6.3.34.tar.gz) = tSsv41aKYKMsL3sDKzkxtoFURKDsRePeOG+DdhbqPgk=
|
||||
SIZE (6.3.34.tar.gz) = 73559189
|
||||
|
|
|
@ -1,5 +1,5 @@
|
|||
|
||||
Metasploit Framework 6.3.32
|
||||
Metasploit Framework 6.3.34
|
||||
|
||||
Help:
|
||||
|
||||
|
|
|
@ -711,6 +711,8 @@ share/metasploit/data/exploits/CVE-2023-21768/CVE-2023-21768.x64.dll
|
|||
share/metasploit/data/exploits/CVE-2023-21839/
|
||||
share/metasploit/data/exploits/CVE-2023-21839/PayloadRuns.class
|
||||
share/metasploit/data/exploits/CVE-2023-21839/PayloadRuns.java
|
||||
share/metasploit/data/exploits/CVE-2023-28252/
|
||||
share/metasploit/data/exploits/CVE-2023-28252/CVE-2023-28252.x64.dll
|
||||
share/metasploit/data/exploits/QTJavaExploit.class
|
||||
share/metasploit/data/exploits/R7_2015_17/
|
||||
share/metasploit/data/exploits/R7_2015_17/stream.raw
|
||||
|
@ -1998,6 +2000,7 @@ share/metasploit/data/wordlists/default_pass_for_services_unhash.txt
|
|||
share/metasploit/data/wordlists/default_userpass_for_services_unhash.txt
|
||||
share/metasploit/data/wordlists/default_users_for_services_unhash.txt
|
||||
share/metasploit/data/wordlists/dlink_telnet_backdoor_userpass.txt
|
||||
share/metasploit/data/wordlists/flask_secret_keys.txt
|
||||
share/metasploit/data/wordlists/grafana_plugins.txt
|
||||
share/metasploit/data/wordlists/hci_oracle_passwords.csv
|
||||
share/metasploit/data/wordlists/http_default_pass.txt
|
||||
|
@ -2039,6 +2042,7 @@ share/metasploit/data/wordlists/sensitive_files.txt
|
|||
share/metasploit/data/wordlists/sensitive_files_win.txt
|
||||
share/metasploit/data/wordlists/sid.txt
|
||||
share/metasploit/data/wordlists/snmp_default_pass.txt
|
||||
share/metasploit/data/wordlists/superset_secret_keys.txt
|
||||
share/metasploit/data/wordlists/telerik_ui_asp_net_ajax_versions.txt
|
||||
share/metasploit/data/wordlists/telnet_cdata_ftth_backdoor_userpass.txt
|
||||
share/metasploit/data/wordlists/tftp.txt
|
||||
|
@ -2453,6 +2457,7 @@ share/metasploit/documentation/modules/auxiliary/fileformat/odt_badodt.md
|
|||
share/metasploit/documentation/modules/auxiliary/gather/
|
||||
share/metasploit/documentation/modules/auxiliary/gather/adobe_coldfusion_fileread_cve_2023_26360.md
|
||||
share/metasploit/documentation/modules/auxiliary/gather/advantech_webaccess_creds.md
|
||||
share/metasploit/documentation/modules/auxiliary/gather/apache_superset_cookie_sig_priv_esc.md
|
||||
share/metasploit/documentation/modules/auxiliary/gather/asterisk_creds.md
|
||||
share/metasploit/documentation/modules/auxiliary/gather/billquick_txtid_sqli.md
|
||||
share/metasploit/documentation/modules/auxiliary/gather/browser_getprivateip.md
|
||||
|
@ -2494,11 +2499,15 @@ share/metasploit/documentation/modules/auxiliary/gather/office365userenum.md
|
|||
share/metasploit/documentation/modules/auxiliary/gather/peplink_bauth_sqli.md
|
||||
share/metasploit/documentation/modules/auxiliary/gather/pimcore_creds_sqli.md
|
||||
share/metasploit/documentation/modules/auxiliary/gather/piwigo_cve_2023_26876.md
|
||||
share/metasploit/documentation/modules/auxiliary/gather/prometheus_api_gather.md
|
||||
share/metasploit/documentation/modules/auxiliary/gather/prometheus_node_exporter_gather.md
|
||||
share/metasploit/documentation/modules/auxiliary/gather/pulse_secure_file_disclosure.md
|
||||
share/metasploit/documentation/modules/auxiliary/gather/python_flask_cookie_signer.md
|
||||
share/metasploit/documentation/modules/auxiliary/gather/qnap_backtrace_admin_hash.md
|
||||
share/metasploit/documentation/modules/auxiliary/gather/qnap_lfi.md
|
||||
share/metasploit/documentation/modules/auxiliary/gather/rails_doubletap_file_read.md
|
||||
share/metasploit/documentation/modules/auxiliary/gather/redis_extractor.md
|
||||
share/metasploit/documentation/modules/auxiliary/gather/roundcube_auth_file_read.md
|
||||
share/metasploit/documentation/modules/auxiliary/gather/saltstack_salt_root_key.md
|
||||
share/metasploit/documentation/modules/auxiliary/gather/samsung_browser_sop_bypass.md
|
||||
share/metasploit/documentation/modules/auxiliary/gather/shodan_honeyscore.md
|
||||
|
@ -2608,6 +2617,7 @@ share/metasploit/documentation/modules/auxiliary/scanner/http/dir_webdav_unicode
|
|||
share/metasploit/documentation/modules/auxiliary/scanner/http/directadmin_login.md
|
||||
share/metasploit/documentation/modules/auxiliary/scanner/http/docker_version.md
|
||||
share/metasploit/documentation/modules/auxiliary/scanner/http/dolibarr_16_contact_dump.md
|
||||
share/metasploit/documentation/modules/auxiliary/scanner/http/elasticsearch_memory_disclosure.md
|
||||
share/metasploit/documentation/modules/auxiliary/scanner/http/emby_ssrf_scanner.md
|
||||
share/metasploit/documentation/modules/auxiliary/scanner/http/emby_version_ssrf.md
|
||||
share/metasploit/documentation/modules/auxiliary/scanner/http/enum_wayback.md
|
||||
|
@ -2745,6 +2755,8 @@ share/metasploit/documentation/modules/auxiliary/scanner/msmail/
|
|||
share/metasploit/documentation/modules/auxiliary/scanner/msmail/exchange_enum.md
|
||||
share/metasploit/documentation/modules/auxiliary/scanner/msmail/host_id.md
|
||||
share/metasploit/documentation/modules/auxiliary/scanner/msmail/onprem_enum.md
|
||||
share/metasploit/documentation/modules/auxiliary/scanner/msmq/
|
||||
share/metasploit/documentation/modules/auxiliary/scanner/msmq/cve_2023_21554_queuejumper.md
|
||||
share/metasploit/documentation/modules/auxiliary/scanner/mssql/
|
||||
share/metasploit/documentation/modules/auxiliary/scanner/mssql/mssql_ping.md
|
||||
share/metasploit/documentation/modules/auxiliary/scanner/mysql/
|
||||
|
@ -3016,9 +3028,11 @@ share/metasploit/documentation/modules/exploit/linux/http/ipfire_oinkcode_exec.m
|
|||
share/metasploit/documentation/modules/exploit/linux/http/ipfire_pakfire_exec.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/ipfire_proxy_exec.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/ivanti_csa_unauth_rce_cve_2021_44529.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/ivanti_sentry_misc_log_service.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/jenkins_cli_deserialization.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/kaltura_unserialize_cookie_rce.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/kaltura_unserialize_rce.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/kibana_timelion_prototype_pollution_rce.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/klog_server_authenticate_user_unauth_command_injection.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/librenms_addhost_cmd_inject.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/librenms_collectd_cmd_inject.md
|
||||
|
@ -3051,6 +3065,7 @@ share/metasploit/documentation/modules/exploit/linux/http/netgear_unauth_exec.md
|
|||
share/metasploit/documentation/modules/exploit/linux/http/netsweeper_webadmin_unixlogin.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/nexus_repo_manager_el_injection.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/op5_config_exec.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/opentsdb_key_cmd_injection.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/opentsdb_yrange_cmd_injection.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/optergy_bms_backdoor_rce_cve_2019_7276.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/oracle_ebs_rce_cve_2022_21587.md
|
||||
|
@ -3072,6 +3087,7 @@ share/metasploit/documentation/modules/exploit/linux/http/roxy_wi_exec.md
|
|||
share/metasploit/documentation/modules/exploit/linux/http/saltstack_salt_api_cmd_exec.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/saltstack_salt_wheel_async_rce.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/samsung_srv_1670d_upload_exec.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/solarview_unauth_rce_cve_2023_23333.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/sonicwall_cve_2021_20039.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/sophos_utm_webadmin_sid_cmd_injection.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/sourcegraph_gitserver_sshcmd.md
|
||||
|
@ -3097,6 +3113,7 @@ share/metasploit/documentation/modules/exploit/linux/http/vmware_nsxmgr_xstream_
|
|||
share/metasploit/documentation/modules/exploit/linux/http/vmware_vcenter_analytics_file_upload.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/vmware_vcenter_vsan_health_rce.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/vmware_view_planner_4_6_uploadlog_rce.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/vmware_vrli_rce.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/vmware_vrni_rce_cve_2023_20887.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/vmware_vrops_mgr_ssrf_rce.md
|
||||
share/metasploit/documentation/modules/exploit/linux/http/vmware_workspace_one_access_cve_2022_22954.md
|
||||
|
@ -3370,6 +3387,7 @@ share/metasploit/documentation/modules/exploit/multi/http/shiro_rememberme_v124_
|
|||
share/metasploit/documentation/modules/exploit/multi/http/shopware_createinstancefromnamedarguments_rce.md
|
||||
share/metasploit/documentation/modules/exploit/multi/http/solr_velocity_rce.md
|
||||
share/metasploit/documentation/modules/exploit/multi/http/sonicwall_scrutinizer_methoddetail_sqli.md
|
||||
share/metasploit/documentation/modules/exploit/multi/http/sonicwall_shell_injection_cve_2023_34124.md
|
||||
share/metasploit/documentation/modules/exploit/multi/http/splunk_upload_app_exec.md
|
||||
share/metasploit/documentation/modules/exploit/multi/http/spring_cloud_function_spel_injection.md
|
||||
share/metasploit/documentation/modules/exploit/multi/http/spring_framework_rce_spring4shell.md
|
||||
|
@ -3608,6 +3626,7 @@ share/metasploit/documentation/modules/exploit/windows/fileformat/office_word_ht
|
|||
share/metasploit/documentation/modules/exploit/windows/fileformat/syncbreeze_xml.md
|
||||
share/metasploit/documentation/modules/exploit/windows/fileformat/vlc_mkv.md
|
||||
share/metasploit/documentation/modules/exploit/windows/fileformat/winrar_ace.md
|
||||
share/metasploit/documentation/modules/exploit/windows/fileformat/winrar_cve_2023_38831.md
|
||||
share/metasploit/documentation/modules/exploit/windows/fileformat/word_msdtjs_rce.md
|
||||
share/metasploit/documentation/modules/exploit/windows/fileformat/word_mshtml_rce.md
|
||||
share/metasploit/documentation/modules/exploit/windows/fileformat/zahir_enterprise_plus_csv.md
|
||||
|
@ -3651,6 +3670,7 @@ share/metasploit/documentation/modules/exploit/windows/http/hp_imc_java_deserial
|
|||
share/metasploit/documentation/modules/exploit/windows/http/hpe_sim_76_amf_deserialization.md
|
||||
share/metasploit/documentation/modules/exploit/windows/http/ivanti_avalanche_filestoreconfig_upload.md
|
||||
share/metasploit/documentation/modules/exploit/windows/http/kentico_staging_syncserver.md
|
||||
share/metasploit/documentation/modules/exploit/windows/http/lg_simple_editor_rce.md
|
||||
share/metasploit/documentation/modules/exploit/windows/http/manage_engine_opmanager_rce.md
|
||||
share/metasploit/documentation/modules/exploit/windows/http/manageengine_adaudit_plus_authenticated_rce.md
|
||||
share/metasploit/documentation/modules/exploit/windows/http/manageengine_adaudit_plus_cve_2022_28219.md
|
||||
|
@ -3729,6 +3749,7 @@ share/metasploit/documentation/modules/exploit/windows/local/cve_2022_21999_spoo
|
|||
share/metasploit/documentation/modules/exploit/windows/local/cve_2022_26904_superprofile.md
|
||||
share/metasploit/documentation/modules/exploit/windows/local/cve_2022_3699_lenovo_diagnostics_driver.md
|
||||
share/metasploit/documentation/modules/exploit/windows/local/cve_2023_21768_afd_lpe.md
|
||||
share/metasploit/documentation/modules/exploit/windows/local/cve_2023_28252_clfs_driver.md
|
||||
share/metasploit/documentation/modules/exploit/windows/local/dnsadmin_serverlevelplugindll.md
|
||||
share/metasploit/documentation/modules/exploit/windows/local/docker_credential_wincred.md
|
||||
share/metasploit/documentation/modules/exploit/windows/local/druva_insync_insynccphwnet64_rcp_type_5_priv_esc.md
|
||||
|
@ -5084,6 +5105,18 @@ share/metasploit/external/source/exploits/CVE-2023-21768/exploit.c
|
|||
share/metasploit/external/source/exploits/CVE-2023-21768/exploit.h
|
||||
share/metasploit/external/source/exploits/CVE-2023-21768/ioring.c
|
||||
share/metasploit/external/source/exploits/CVE-2023-21768/ioring.h
|
||||
share/metasploit/external/source/exploits/CVE-2023-28252/
|
||||
share/metasploit/external/source/exploits/CVE-2023-28252/CVE-2023-28252/
|
||||
share/metasploit/external/source/exploits/CVE-2023-28252/CVE-2023-28252.sln
|
||||
share/metasploit/external/source/exploits/CVE-2023-28252/CVE-2023-28252/CVE-2023-28252.vcxproj
|
||||
share/metasploit/external/source/exploits/CVE-2023-28252/CVE-2023-28252/clfs_eop.cpp
|
||||
share/metasploit/external/source/exploits/CVE-2023-28252/CVE-2023-28252/clfs_eop.h
|
||||
share/metasploit/external/source/exploits/CVE-2023-28252/CVE-2023-28252/crc32.h
|
||||
share/metasploit/external/source/exploits/CVE-2023-28252/CVE-2023-28252/dllmain.cpp
|
||||
share/metasploit/external/source/exploits/CVE-2023-28252/CVE-2023-28252/exploit.cpp
|
||||
share/metasploit/external/source/exploits/CVE-2023-28252/CVE-2023-28252/exploit.h
|
||||
share/metasploit/external/source/exploits/CVE-2023-28252/CVE-2023-28252/ntos.h
|
||||
share/metasploit/external/source/exploits/CVE-2023-28252/CVE-2023-28252/ntoskrnl.lib
|
||||
share/metasploit/external/source/exploits/IE11SandboxEscapes/
|
||||
share/metasploit/external/source/exploits/IE11SandboxEscapes/CVE-2013-5045/
|
||||
share/metasploit/external/source/exploits/IE11SandboxEscapes/CVE-2013-5045/CVE-2013-5045.cpp
|
||||
|
@ -6839,6 +6872,7 @@ share/metasploit/lib/msf/core/auxiliary/nmap.rb
|
|||
share/metasploit/lib/msf/core/auxiliary/ntp.rb
|
||||
share/metasploit/lib/msf/core/auxiliary/password_cracker.rb
|
||||
share/metasploit/lib/msf/core/auxiliary/pii.rb
|
||||
share/metasploit/lib/msf/core/auxiliary/prometheus.rb
|
||||
share/metasploit/lib/msf/core/auxiliary/redis.rb
|
||||
share/metasploit/lib/msf/core/auxiliary/report.rb
|
||||
share/metasploit/lib/msf/core/auxiliary/rocketmq.rb
|
||||
|
@ -7064,6 +7098,7 @@ share/metasploit/lib/msf/core/exploit/remote/http/drupal.rb
|
|||
share/metasploit/lib/msf/core/exploit/remote/http/exchange/
|
||||
share/metasploit/lib/msf/core/exploit/remote/http/exchange.rb
|
||||
share/metasploit/lib/msf/core/exploit/remote/http/exchange/proxy_maybe_shell.rb
|
||||
share/metasploit/lib/msf/core/exploit/remote/http/flask_unsign.rb
|
||||
share/metasploit/lib/msf/core/exploit/remote/http/gitea/
|
||||
share/metasploit/lib/msf/core/exploit/remote/http/gitea.rb
|
||||
share/metasploit/lib/msf/core/exploit/remote/http/gitea/base.rb
|
||||
|
@ -8751,37 +8786,37 @@ share/metasploit/lib/telephony/
|
|||
share/metasploit/lib/telephony.rb
|
||||
share/metasploit/lib/telephony/modem.rb
|
||||
share/metasploit/lib/windows_console_color_support.rb
|
||||
share/metasploit/metasploit-framework-6.3.32/
|
||||
share/metasploit/metasploit-framework-6.3.32/.dockerignore
|
||||
share/metasploit/metasploit-framework-6.3.32/.git-blame-ignore-revs
|
||||
share/metasploit/metasploit-framework-6.3.32/.github/
|
||||
share/metasploit/metasploit-framework-6.3.32/.github/ISSUE_TEMPLATE/
|
||||
share/metasploit/metasploit-framework-6.3.32/.github/ISSUE_TEMPLATE/bug_report.md
|
||||
share/metasploit/metasploit-framework-6.3.32/.github/ISSUE_TEMPLATE/config.yml
|
||||
share/metasploit/metasploit-framework-6.3.32/.github/ISSUE_TEMPLATE/documentation.md
|
||||
share/metasploit/metasploit-framework-6.3.32/.github/ISSUE_TEMPLATE/feature_suggestion.md
|
||||
share/metasploit/metasploit-framework-6.3.32/.github/ISSUE_TEMPLATE/module_suggestion.md
|
||||
share/metasploit/metasploit-framework-6.3.32/.github/ISSUE_TEMPLATE/question.md
|
||||
share/metasploit/metasploit-framework-6.3.32/.github/PULL_REQUEST_TEMPLATE.md
|
||||
share/metasploit/metasploit-framework-6.3.32/.github/SECURITY.md
|
||||
share/metasploit/metasploit-framework-6.3.32/.github/workflows/
|
||||
share/metasploit/metasploit-framework-6.3.32/.github/workflows/acceptance.yml
|
||||
share/metasploit/metasploit-framework-6.3.32/.github/workflows/docs.yml
|
||||
share/metasploit/metasploit-framework-6.3.32/.github/workflows/labels.yml
|
||||
share/metasploit/metasploit-framework-6.3.32/.github/workflows/lint.yml
|
||||
share/metasploit/metasploit-framework-6.3.32/.github/workflows/schedule-stale.yml
|
||||
share/metasploit/metasploit-framework-6.3.32/.github/workflows/verify.yml
|
||||
share/metasploit/metasploit-framework-6.3.32/.github/workflows/weekly-dependencies-pr.yml
|
||||
share/metasploit/metasploit-framework-6.3.32/.gitignore
|
||||
share/metasploit/metasploit-framework-6.3.32/.gitmodules
|
||||
share/metasploit/metasploit-framework-6.3.32/.mailmap
|
||||
share/metasploit/metasploit-framework-6.3.32/.rspec
|
||||
share/metasploit/metasploit-framework-6.3.32/.rubocop.yml
|
||||
share/metasploit/metasploit-framework-6.3.32/.ruby-gemset
|
||||
share/metasploit/metasploit-framework-6.3.32/.ruby-version
|
||||
share/metasploit/metasploit-framework-6.3.32/.simplecov
|
||||
share/metasploit/metasploit-framework-6.3.32/.solargraph.yml
|
||||
share/metasploit/metasploit-framework-6.3.32/.yardopts
|
||||
share/metasploit/${DISTNAME}/
|
||||
share/metasploit/${DISTNAME}/.dockerignore
|
||||
share/metasploit/${DISTNAME}/.git-blame-ignore-revs
|
||||
share/metasploit/${DISTNAME}/.github/
|
||||
share/metasploit/${DISTNAME}/.github/ISSUE_TEMPLATE/
|
||||
share/metasploit/${DISTNAME}/.github/ISSUE_TEMPLATE/bug_report.md
|
||||
share/metasploit/${DISTNAME}/.github/ISSUE_TEMPLATE/config.yml
|
||||
share/metasploit/${DISTNAME}/.github/ISSUE_TEMPLATE/documentation.md
|
||||
share/metasploit/${DISTNAME}/.github/ISSUE_TEMPLATE/feature_suggestion.md
|
||||
share/metasploit/${DISTNAME}/.github/ISSUE_TEMPLATE/module_suggestion.md
|
||||
share/metasploit/${DISTNAME}/.github/ISSUE_TEMPLATE/question.md
|
||||
share/metasploit/${DISTNAME}/.github/PULL_REQUEST_TEMPLATE.md
|
||||
share/metasploit/${DISTNAME}/.github/SECURITY.md
|
||||
share/metasploit/${DISTNAME}/.github/workflows/
|
||||
share/metasploit/${DISTNAME}/.github/workflows/acceptance.yml
|
||||
share/metasploit/${DISTNAME}/.github/workflows/docs.yml
|
||||
share/metasploit/${DISTNAME}/.github/workflows/labels.yml
|
||||
share/metasploit/${DISTNAME}/.github/workflows/lint.yml
|
||||
share/metasploit/${DISTNAME}/.github/workflows/schedule-stale.yml
|
||||
share/metasploit/${DISTNAME}/.github/workflows/verify.yml
|
||||
share/metasploit/${DISTNAME}/.github/workflows/weekly-dependencies-pr.yml
|
||||
share/metasploit/${DISTNAME}/.gitignore
|
||||
share/metasploit/${DISTNAME}/.gitmodules
|
||||
share/metasploit/${DISTNAME}/.mailmap
|
||||
share/metasploit/${DISTNAME}/.rspec
|
||||
share/metasploit/${DISTNAME}/.rubocop.yml
|
||||
share/metasploit/${DISTNAME}/.ruby-gemset
|
||||
share/metasploit/${DISTNAME}/.ruby-version
|
||||
share/metasploit/${DISTNAME}/.simplecov
|
||||
share/metasploit/${DISTNAME}/.solargraph.yml
|
||||
share/metasploit/${DISTNAME}/.yardopts
|
||||
share/metasploit/metasploit-framework.gemspec
|
||||
share/metasploit/modules/
|
||||
share/metasploit/modules/README.md
|
||||
|
@ -9289,6 +9324,7 @@ share/metasploit/modules/auxiliary/gather/android_htmlfileprovider.rb
|
|||
share/metasploit/modules/auxiliary/gather/android_object_tag_webview_uxss.rb
|
||||
share/metasploit/modules/auxiliary/gather/android_stock_browser_uxss.rb
|
||||
share/metasploit/modules/auxiliary/gather/apache_rave_creds.rb
|
||||
share/metasploit/modules/auxiliary/gather/apache_superset_cookie_sig_priv_esc.rb
|
||||
share/metasploit/modules/auxiliary/gather/apple_safari_ftp_url_cookie_theft.rb
|
||||
share/metasploit/modules/auxiliary/gather/apple_safari_webarchive_uxss.rb
|
||||
share/metasploit/modules/auxiliary/gather/asterisk_creds.rb
|
||||
|
@ -9376,11 +9412,15 @@ share/metasploit/modules/auxiliary/gather/opennms_xxe.rb
|
|||
share/metasploit/modules/auxiliary/gather/peplink_bauth_sqli.rb
|
||||
share/metasploit/modules/auxiliary/gather/pimcore_creds_sqli.rb
|
||||
share/metasploit/modules/auxiliary/gather/piwigo_cve_2023_26876.rb
|
||||
share/metasploit/modules/auxiliary/gather/prometheus_api_gather.rb
|
||||
share/metasploit/modules/auxiliary/gather/prometheus_node_exporter_gather.rb
|
||||
share/metasploit/modules/auxiliary/gather/pulse_secure_file_disclosure.rb
|
||||
share/metasploit/modules/auxiliary/gather/python_flask_cookie_signer.rb
|
||||
share/metasploit/modules/auxiliary/gather/qnap_backtrace_admin_hash.rb
|
||||
share/metasploit/modules/auxiliary/gather/qnap_lfi.rb
|
||||
share/metasploit/modules/auxiliary/gather/rails_doubletap_file_read.rb
|
||||
share/metasploit/modules/auxiliary/gather/redis_extractor.rb
|
||||
share/metasploit/modules/auxiliary/gather/roundcube_auth_file_read.rb
|
||||
share/metasploit/modules/auxiliary/gather/safari_file_url_navigation.rb
|
||||
share/metasploit/modules/auxiliary/gather/saltstack_salt_root_key.rb
|
||||
share/metasploit/modules/auxiliary/gather/samsung_browser_sop_bypass.rb
|
||||
|
@ -9557,6 +9597,7 @@ share/metasploit/modules/auxiliary/scanner/http/dolibarr_16_contact_dump.rb
|
|||
share/metasploit/modules/auxiliary/scanner/http/dolibarr_login.rb
|
||||
share/metasploit/modules/auxiliary/scanner/http/drupal_views_user_enum.rb
|
||||
share/metasploit/modules/auxiliary/scanner/http/ektron_cms400net.rb
|
||||
share/metasploit/modules/auxiliary/scanner/http/elasticsearch_memory_disclosure.rb
|
||||
share/metasploit/modules/auxiliary/scanner/http/elasticsearch_traversal.rb
|
||||
share/metasploit/modules/auxiliary/scanner/http/emby_ssrf_scanner.rb
|
||||
share/metasploit/modules/auxiliary/scanner/http/emby_version_ssrf.rb
|
||||
|
@ -9843,6 +9884,8 @@ share/metasploit/modules/auxiliary/scanner/msmail/shared/
|
|||
share/metasploit/modules/auxiliary/scanner/msmail/shared/src/
|
||||
share/metasploit/modules/auxiliary/scanner/msmail/shared/src/msmail/
|
||||
share/metasploit/modules/auxiliary/scanner/msmail/shared/src/msmail/msmail.go
|
||||
share/metasploit/modules/auxiliary/scanner/msmq/
|
||||
share/metasploit/modules/auxiliary/scanner/msmq/cve_2023_21554_queuejumper.rb
|
||||
share/metasploit/modules/auxiliary/scanner/mssql/
|
||||
share/metasploit/modules/auxiliary/scanner/mssql/mssql_hashdump.rb
|
||||
share/metasploit/modules/auxiliary/scanner/mssql/mssql_login.rb
|
||||
|
@ -10516,9 +10559,11 @@ share/metasploit/modules/exploits/linux/http/ipfire_oinkcode_exec.rb
|
|||
share/metasploit/modules/exploits/linux/http/ipfire_pakfire_exec.rb
|
||||
share/metasploit/modules/exploits/linux/http/ipfire_proxy_exec.rb
|
||||
share/metasploit/modules/exploits/linux/http/ivanti_csa_unauth_rce_cve_2021_44529.rb
|
||||
share/metasploit/modules/exploits/linux/http/ivanti_sentry_misc_log_service.rb
|
||||
share/metasploit/modules/exploits/linux/http/jenkins_cli_deserialization.rb
|
||||
share/metasploit/modules/exploits/linux/http/kaltura_unserialize_cookie_rce.rb
|
||||
share/metasploit/modules/exploits/linux/http/kaltura_unserialize_rce.rb
|
||||
share/metasploit/modules/exploits/linux/http/kibana_timelion_prototype_pollution_rce.rb
|
||||
share/metasploit/modules/exploits/linux/http/klog_server_authenticate_user_unauth_command_injection.rb
|
||||
share/metasploit/modules/exploits/linux/http/kloxo_sqli.rb
|
||||
share/metasploit/modules/exploits/linux/http/librenms_addhost_cmd_inject.rb
|
||||
|
@ -10569,6 +10614,7 @@ share/metasploit/modules/exploits/linux/http/nuuo_nvrmini_auth_rce.rb
|
|||
share/metasploit/modules/exploits/linux/http/nuuo_nvrmini_unauth_rce.rb
|
||||
share/metasploit/modules/exploits/linux/http/op5_config_exec.rb
|
||||
share/metasploit/modules/exploits/linux/http/openfiler_networkcard_exec.rb
|
||||
share/metasploit/modules/exploits/linux/http/opentsdb_key_cmd_injection.rb
|
||||
share/metasploit/modules/exploits/linux/http/opentsdb_yrange_cmd_injection.rb
|
||||
share/metasploit/modules/exploits/linux/http/optergy_bms_backdoor_rce_cve_2019_7276.rb
|
||||
share/metasploit/modules/exploits/linux/http/oracle_ebs_rce_cve_2022_21587.rb
|
||||
|
@ -10603,6 +10649,7 @@ share/metasploit/modules/exploits/linux/http/saltstack_salt_wheel_async_rce.rb
|
|||
share/metasploit/modules/exploits/linux/http/samsung_srv_1670d_upload_exec.rb
|
||||
share/metasploit/modules/exploits/linux/http/seagate_nas_php_exec_noauth.rb
|
||||
share/metasploit/modules/exploits/linux/http/smt_ipmi_close_window_bof.rb
|
||||
share/metasploit/modules/exploits/linux/http/solarview_unauth_rce_cve_2023_23333.rb
|
||||
share/metasploit/modules/exploits/linux/http/sonicwall_cve_2021_20039.rb
|
||||
share/metasploit/modules/exploits/linux/http/sophos_utm_webadmin_sid_cmd_injection.rb
|
||||
share/metasploit/modules/exploits/linux/http/sophos_wpa_iface_exec.rb
|
||||
|
@ -10645,6 +10692,7 @@ share/metasploit/modules/exploits/linux/http/vmware_nsxmgr_xstream_rce_cve_2021_
|
|||
share/metasploit/modules/exploits/linux/http/vmware_vcenter_analytics_file_upload.rb
|
||||
share/metasploit/modules/exploits/linux/http/vmware_vcenter_vsan_health_rce.rb
|
||||
share/metasploit/modules/exploits/linux/http/vmware_view_planner_4_6_uploadlog_rce.rb
|
||||
share/metasploit/modules/exploits/linux/http/vmware_vrli_rce.rb
|
||||
share/metasploit/modules/exploits/linux/http/vmware_vrni_rce_cve_2023_20887.rb
|
||||
share/metasploit/modules/exploits/linux/http/vmware_vrops_mgr_ssrf_rce.rb
|
||||
share/metasploit/modules/exploits/linux/http/vmware_workspace_one_access_cve_2022_22954.rb
|
||||
|
@ -11129,6 +11177,7 @@ share/metasploit/modules/exploits/multi/http/solarwinds_store_manager_auth_filte
|
|||
share/metasploit/modules/exploits/multi/http/solr_velocity_rce.rb
|
||||
share/metasploit/modules/exploits/multi/http/sonicwall_gms_upload.rb
|
||||
share/metasploit/modules/exploits/multi/http/sonicwall_scrutinizer_methoddetail_sqli.rb
|
||||
share/metasploit/modules/exploits/multi/http/sonicwall_shell_injection_cve_2023_34124.rb
|
||||
share/metasploit/modules/exploits/multi/http/splunk_mappy_exec.rb
|
||||
share/metasploit/modules/exploits/multi/http/splunk_upload_app_exec.rb
|
||||
share/metasploit/modules/exploits/multi/http/spree_search_exec.rb
|
||||
|
@ -12099,6 +12148,7 @@ share/metasploit/modules/exploits/windows/fileformat/vuplayer_m3u.rb
|
|||
share/metasploit/modules/exploits/windows/fileformat/watermark_master.rb
|
||||
share/metasploit/modules/exploits/windows/fileformat/winamp_maki_bof.rb
|
||||
share/metasploit/modules/exploits/windows/fileformat/winrar_ace.rb
|
||||
share/metasploit/modules/exploits/windows/fileformat/winrar_cve_2023_38831.rb
|
||||
share/metasploit/modules/exploits/windows/fileformat/winrar_name_spoofing.rb
|
||||
share/metasploit/modules/exploits/windows/fileformat/wireshark_mpeg_overflow.rb
|
||||
share/metasploit/modules/exploits/windows/fileformat/wireshark_packet_dect.rb
|
||||
|
@ -12300,6 +12350,7 @@ share/metasploit/modules/exploits/windows/http/kentico_staging_syncserver.rb
|
|||
share/metasploit/modules/exploits/windows/http/kolibri_http.rb
|
||||
share/metasploit/modules/exploits/windows/http/landesk_thinkmanagement_upload_asp.rb
|
||||
share/metasploit/modules/exploits/windows/http/lexmark_markvision_gfd_upload.rb
|
||||
share/metasploit/modules/exploits/windows/http/lg_simple_editor_rce.rb
|
||||
share/metasploit/modules/exploits/windows/http/mailenable_auth_header.rb
|
||||
share/metasploit/modules/exploits/windows/http/manage_engine_opmanager_rce.rb
|
||||
share/metasploit/modules/exploits/windows/http/manageengine_adaudit_plus_authenticated_rce.rb
|
||||
|
@ -12478,6 +12529,7 @@ share/metasploit/modules/exploits/windows/local/cve_2022_21999_spoolfool_privesc
|
|||
share/metasploit/modules/exploits/windows/local/cve_2022_26904_superprofile.rb
|
||||
share/metasploit/modules/exploits/windows/local/cve_2022_3699_lenovo_diagnostics_driver.rb
|
||||
share/metasploit/modules/exploits/windows/local/cve_2023_21768_afd_lpe.rb
|
||||
share/metasploit/modules/exploits/windows/local/cve_2023_28252_clfs_driver.rb
|
||||
share/metasploit/modules/exploits/windows/local/dnsadmin_serverlevelplugindll.rb
|
||||
share/metasploit/modules/exploits/windows/local/docker_credential_wincred.rb
|
||||
share/metasploit/modules/exploits/windows/local/druva_insync_insynccphwnet64_rcp_type_5_priv_esc.rb
|
||||
|
@ -14227,6 +14279,7 @@ share/metasploit/spec/lib/msf/core/auxiliary/juniper_spec.rb
|
|||
share/metasploit/spec/lib/msf/core/auxiliary/kademlia_spec.rb
|
||||
share/metasploit/spec/lib/msf/core/auxiliary/mikrotik_spec.rb
|
||||
share/metasploit/spec/lib/msf/core/auxiliary/nfs_spec.rb
|
||||
share/metasploit/spec/lib/msf/core/auxiliary/prometheus_spec.rb
|
||||
share/metasploit/spec/lib/msf/core/auxiliary/redis_spec.rb
|
||||
share/metasploit/spec/lib/msf/core/auxiliary/rocketmq_spec.rb
|
||||
share/metasploit/spec/lib/msf/core/auxiliary/ubiquiti_spec.rb
|
||||
|
@ -14275,6 +14328,9 @@ share/metasploit/spec/lib/msf/core/exploit/remote/browser_exploit_server_spec.rb
|
|||
share/metasploit/spec/lib/msf/core/exploit/remote/browser_profile_manager_spec.rb
|
||||
share/metasploit/spec/lib/msf/core/exploit/remote/firefox_addon_generator_spec.rb
|
||||
share/metasploit/spec/lib/msf/core/exploit/remote/firefox_privilege_escalation_spec.rb
|
||||
share/metasploit/spec/lib/msf/core/exploit/remote/http/
|
||||
share/metasploit/spec/lib/msf/core/exploit/remote/http/flask_unsign/
|
||||
share/metasploit/spec/lib/msf/core/exploit/remote/http/flask_unsign/session_spec.rb
|
||||
share/metasploit/spec/lib/msf/core/exploit/remote/java/
|
||||
share/metasploit/spec/lib/msf/core/exploit/remote/java/rmi/
|
||||
share/metasploit/spec/lib/msf/core/exploit/remote/java/rmi/builder_spec.rb
|
||||
|
@ -14872,6 +14928,9 @@ share/metasploit/spec/tools/cpassword_decrypt_spec.rb
|
|||
share/metasploit/spec/tools/dev/
|
||||
share/metasploit/spec/tools/dev/msftidy_runner_spec.rb
|
||||
share/metasploit/spec/tools/dev/msftidy_spec.rb
|
||||
share/metasploit/spec/tools/dev/report_generation/
|
||||
share/metasploit/spec/tools/dev/report_generation/support_matrix/
|
||||
share/metasploit/spec/tools/dev/report_generation/support_matrix/generate_spec.rb
|
||||
share/metasploit/spec/tools/dev/rubocop_runner_spec.rb
|
||||
share/metasploit/spec/tools/egghunter_spec.rb
|
||||
share/metasploit/spec/tools/java_deserializer_spec.rb
|
||||
|
@ -15045,6 +15104,10 @@ share/metasploit/tools/dev/msfdb_ws
|
|||
share/metasploit/tools/dev/msftidy.rb
|
||||
share/metasploit/tools/dev/msftidy_docs.rb
|
||||
share/metasploit/tools/dev/pre-commit-hook.rb
|
||||
share/metasploit/tools/dev/report_generation/
|
||||
share/metasploit/tools/dev/report_generation/support_matrix/
|
||||
share/metasploit/tools/dev/report_generation/support_matrix/generate.rb
|
||||
share/metasploit/tools/dev/report_generation/support_matrix/template.erb
|
||||
share/metasploit/tools/dev/set_binary_encoding.rb
|
||||
share/metasploit/tools/dev/sign-dev-keys.sh
|
||||
share/metasploit/tools/dev/update_gem_licenses.sh
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue