1
mirror of https://github.com/rapid7/metasploit-framework synced 2024-07-18 18:31:41 +02:00

Permissions

This commit is contained in:
HD Moore 2012-06-12 00:05:51 -05:00
parent 53affcb76c
commit 5922ec1f7a
19 changed files with 3 additions and 0 deletions

0
data/exploits/CVE-2011-3400/CVE-2011-3400.vsd Normal file → Executable file
View File

0
data/exploits/CVE-2012-0013/[Content_Types].xml Normal file → Executable file
View File

0
data/exploits/CVE-2012-0013/_rels/__rels Normal file → Executable file
View File

0
data/exploits/CVE-2012-0013/docProps/app.xml Normal file → Executable file
View File

0
data/exploits/CVE-2012-0013/docProps/core.xml Normal file → Executable file
View File

View File

View File

0
data/exploits/CVE-2012-0013/word/document.xml Normal file → Executable file
View File

View File

0
data/exploits/CVE-2012-0013/word/fontTable.xml Normal file → Executable file
View File

0
data/exploits/CVE-2012-0013/word/media/image1.emf Normal file → Executable file
View File

Before

Width:  |  Height:  |  Size: 18 KiB

After

Width:  |  Height:  |  Size: 18 KiB

0
data/exploits/CVE-2012-0013/word/settings.xml Normal file → Executable file
View File

0
data/exploits/CVE-2012-0013/word/styles.xml Normal file → Executable file
View File

0
data/exploits/CVE-2012-0013/word/stylesWithEffects.xml Normal file → Executable file
View File

0
data/exploits/CVE-2012-0013/word/theme/theme1.xml Normal file → Executable file
View File

0
data/exploits/CVE-2012-0013/word/vbaData.xml Normal file → Executable file
View File

0
data/exploits/CVE-2012-0013/word/vbaProject.bin Normal file → Executable file
View File

0
data/exploits/CVE-2012-0013/word/webSettings.xml Normal file → Executable file
View File

View File

@ -40,6 +40,9 @@ class Metasploit3 < Msf::Auxiliary
)
deregister_options('PASSWORD')
register_options( [
OptString.new('USERNAME', [ true, 'The username to authenticate as', "root" ])
], self.class )
end