mirror of
https://github.com/rapid7/metasploit-framework
synced 2024-07-18 18:31:41 +02:00
Permissions
This commit is contained in:
parent
53affcb76c
commit
5922ec1f7a
0
data/exploits/CVE-2011-3400/CVE-2011-3400.vsd
Normal file → Executable file
0
data/exploits/CVE-2011-3400/CVE-2011-3400.vsd
Normal file → Executable file
0
data/exploits/CVE-2012-0013/[Content_Types].xml
Normal file → Executable file
0
data/exploits/CVE-2012-0013/[Content_Types].xml
Normal file → Executable file
0
data/exploits/CVE-2012-0013/_rels/__rels
Normal file → Executable file
0
data/exploits/CVE-2012-0013/_rels/__rels
Normal file → Executable file
0
data/exploits/CVE-2012-0013/docProps/app.xml
Normal file → Executable file
0
data/exploits/CVE-2012-0013/docProps/app.xml
Normal file → Executable file
0
data/exploits/CVE-2012-0013/docProps/core.xml
Normal file → Executable file
0
data/exploits/CVE-2012-0013/docProps/core.xml
Normal file → Executable file
0
data/exploits/CVE-2012-0013/word/_rels/document.xml.rels
Normal file → Executable file
0
data/exploits/CVE-2012-0013/word/_rels/document.xml.rels
Normal file → Executable file
0
data/exploits/CVE-2012-0013/word/_rels/vbaProject.bin.rels
Normal file → Executable file
0
data/exploits/CVE-2012-0013/word/_rels/vbaProject.bin.rels
Normal file → Executable file
0
data/exploits/CVE-2012-0013/word/document.xml
Normal file → Executable file
0
data/exploits/CVE-2012-0013/word/document.xml
Normal file → Executable file
0
data/exploits/CVE-2012-0013/word/embeddings/oleObject1.bin
Normal file → Executable file
0
data/exploits/CVE-2012-0013/word/embeddings/oleObject1.bin
Normal file → Executable file
0
data/exploits/CVE-2012-0013/word/fontTable.xml
Normal file → Executable file
0
data/exploits/CVE-2012-0013/word/fontTable.xml
Normal file → Executable file
0
data/exploits/CVE-2012-0013/word/media/image1.emf
Normal file → Executable file
0
data/exploits/CVE-2012-0013/word/media/image1.emf
Normal file → Executable file
Before Width: | Height: | Size: 18 KiB After Width: | Height: | Size: 18 KiB |
0
data/exploits/CVE-2012-0013/word/settings.xml
Normal file → Executable file
0
data/exploits/CVE-2012-0013/word/settings.xml
Normal file → Executable file
0
data/exploits/CVE-2012-0013/word/styles.xml
Normal file → Executable file
0
data/exploits/CVE-2012-0013/word/styles.xml
Normal file → Executable file
0
data/exploits/CVE-2012-0013/word/stylesWithEffects.xml
Normal file → Executable file
0
data/exploits/CVE-2012-0013/word/stylesWithEffects.xml
Normal file → Executable file
0
data/exploits/CVE-2012-0013/word/theme/theme1.xml
Normal file → Executable file
0
data/exploits/CVE-2012-0013/word/theme/theme1.xml
Normal file → Executable file
0
data/exploits/CVE-2012-0013/word/vbaData.xml
Normal file → Executable file
0
data/exploits/CVE-2012-0013/word/vbaData.xml
Normal file → Executable file
0
data/exploits/CVE-2012-0013/word/vbaProject.bin
Normal file → Executable file
0
data/exploits/CVE-2012-0013/word/vbaProject.bin
Normal file → Executable file
0
data/exploits/CVE-2012-0013/word/webSettings.xml
Normal file → Executable file
0
data/exploits/CVE-2012-0013/word/webSettings.xml
Normal file → Executable file
@ -40,6 +40,9 @@ class Metasploit3 < Msf::Auxiliary
|
||||
)
|
||||
|
||||
deregister_options('PASSWORD')
|
||||
register_options( [
|
||||
OptString.new('USERNAME', [ true, 'The username to authenticate as', "root" ])
|
||||
], self.class )
|
||||
end
|
||||
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user