{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":2293158,"defaultBranch":"master","name":"metasploit-framework","ownerLogin":"rapid7","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2011-08-30T06:13:20.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/1013671?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1718268189.0","currentOid":""},"activityList":{"items":[{"before":"90bb6b9b01f42d60c26f3b8cdcbd15656ac8b4e0","after":"b6d2fb654bbbe9d53e9d42b952b6c06c2ed17cc5","ref":"refs/heads/master","pushedAt":"2024-06-14T22:59:03.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"msjenkins-r7","name":"Metasploit Jenkins Bot","path":"/msjenkins-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5332090?s=80&v=4"},"commit":{"message":"automatic module_metadata_base.json update","shortMessageHtmlLink":"automatic module_metadata_base.json update"}},{"before":"c8dc3ed661af4a3df1ffb9c2cf74b6ca47a297a5","after":"90bb6b9b01f42d60c26f3b8cdcbd15656ac8b4e0","ref":"refs/heads/master","pushedAt":"2024-06-14T22:42:35.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"jheysel-r7","name":null,"path":"/jheysel-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/23320005?s=80&v=4"},"commit":{"message":"Land #19261, Fix powershell_base64 encoder\n\nThe powershell_base64 encoder was changed to use the Windows start\ncommand, which broke some payload after they were encoded. This was\nbecause when using start, the argument can not be a string of commands\njoined by & which is required by the fetch payloads. This fixes that\nissue by removing the start command from the encoder","shortMessageHtmlLink":"Land #19261, Fix powershell_base64 encoder"}},{"before":"178bb3e0853cdba3418409ed5f073510e37244c6","after":"c8dc3ed661af4a3df1ffb9c2cf74b6ca47a297a5","ref":"refs/heads/master","pushedAt":"2024-06-14T18:51:52.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"msjenkins-r7","name":"Metasploit Jenkins Bot","path":"/msjenkins-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5332090?s=80&v=4"},"commit":{"message":"automatic module_metadata_base.json update","shortMessageHtmlLink":"automatic module_metadata_base.json update"}},{"before":"de3e92957c7d7dfdddf55bd09ea6a8e3587d9fe5","after":"178bb3e0853cdba3418409ed5f073510e37244c6","ref":"refs/heads/master","pushedAt":"2024-06-14T18:35:39.000Z","pushType":"push","commitsCount":9,"pusher":{"login":"jheysel-r7","name":null,"path":"/jheysel-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/23320005?s=80&v=4"},"commit":{"message":"Land #19229, Junos OS PHPRC module enhancement\n\nThe junos_phprc_auto_prepend_file module used to depend on having a user\nauthenticated to the J-Web application to steal the necessary session\ntokens in order to exploit. With this enhancement the module will now\ncreate a session if one doesnt exist. Also it adds datastore options to\nchange the hash format to be compatible with older version as well an\noption to attempt to set ssh root login to true before attempting to\nestablish a root ssh session","shortMessageHtmlLink":"Land #19229, Junos OS PHPRC module enhancement"}},{"before":"35d161be918562aabbe869dffc4d345972cba3ff","after":"de3e92957c7d7dfdddf55bd09ea6a8e3587d9fe5","ref":"refs/heads/master","pushedAt":"2024-06-13T18:29:18.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"msjenkins-r7","name":"Metasploit Jenkins Bot","path":"/msjenkins-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5332090?s=80&v=4"},"commit":{"message":"automatic module_metadata_base.json update","shortMessageHtmlLink":"automatic module_metadata_base.json update"}},{"before":"906a3486dc808bb4783c6e252709dfc8d7b07641","after":"35d161be918562aabbe869dffc4d345972cba3ff","ref":"refs/heads/master","pushedAt":"2024-06-13T18:04:24.000Z","pushType":"push","commitsCount":9,"pusher":{"login":"jheysel-r7","name":null,"path":"/jheysel-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/23320005?s=80&v=4"},"commit":{"message":"Land #19221, CheckPoint Security Gateway file read\n\nThis module leverages an unauthenticated arbitrary root file read\nvulnerability for Check Point Security Gateway appliances. When the\nIPSec VPN or Mobile Access blades are enabled on affected devices,\ntraversal payloads can be used to read any files on the local file\nsystem. This vulnerability is tracked as CVE-2024-24919.","shortMessageHtmlLink":"Land #19221, CheckPoint Security Gateway file read"}},{"before":"0961722704e7dfd02c7fd14533e2ec0fdf8586f1","after":"cd9b3521dac0673f5476e73f5b4da2017df9867c","ref":"refs/heads/gh-pages","pushedAt":"2024-06-13T12:40:07.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"msjenkins-r7","name":"Metasploit Jenkins Bot","path":"/msjenkins-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5332090?s=80&v=4"},"commit":{"message":"Reboot gh-pages","shortMessageHtmlLink":"Reboot gh-pages"}},{"before":"66f3f53528ad87fcb7445c6c687837b2ca427d70","after":"0961722704e7dfd02c7fd14533e2ec0fdf8586f1","ref":"refs/heads/gh-pages","pushedAt":"2024-06-13T12:38:50.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"msjenkins-r7","name":"Metasploit Jenkins Bot","path":"/msjenkins-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5332090?s=80&v=4"},"commit":{"message":"Update docs","shortMessageHtmlLink":"Update docs"}},{"before":"d31d282a738b3c68480e24a02c73e224f6d7cf92","after":"906a3486dc808bb4783c6e252709dfc8d7b07641","ref":"refs/heads/master","pushedAt":"2024-06-13T12:31:59.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"dwelch-r7","name":null,"path":"/dwelch-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19910435?s=80&v=4"},"commit":{"message":"Land #19258, Update linting Ruby version","shortMessageHtmlLink":"Land #19258, Update linting Ruby version"}},{"before":"f5aea8c11be85c89718de1c4622277fd260ca995","after":"d31d282a738b3c68480e24a02c73e224f6d7cf92","ref":"refs/heads/master","pushedAt":"2024-06-13T10:20:22.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"dwelch-r7","name":null,"path":"/dwelch-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/19910435?s=80&v=4"},"commit":{"message":"Land #19256, Fix warnings in acceptance tests","shortMessageHtmlLink":"Land #19256, Fix warnings in acceptance tests"}},{"before":"d9bfcd464d7966a1e1b52af494f4b0c0afdf5356","after":"f5aea8c11be85c89718de1c4622277fd260ca995","ref":"refs/heads/master","pushedAt":"2024-06-13T08:43:07.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"msjenkins-r7","name":"Metasploit Jenkins Bot","path":"/msjenkins-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5332090?s=80&v=4"},"commit":{"message":"Bump version of framework to 6.4.14","shortMessageHtmlLink":"Bump version of framework to 6.4.14"}},{"before":"b9b638dd83402c76050696a9314d6d3348e6c600","after":"d9bfcd464d7966a1e1b52af494f4b0c0afdf5356","ref":"refs/heads/master","pushedAt":"2024-06-12T22:59:06.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"msjenkins-r7","name":"Metasploit Jenkins Bot","path":"/msjenkins-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5332090?s=80&v=4"},"commit":{"message":"automatic module_metadata_base.json update","shortMessageHtmlLink":"automatic module_metadata_base.json update"}},{"before":"7031e0c7d7dcfb91e99555ed1ea5da7a16a8f687","after":"b9b638dd83402c76050696a9314d6d3348e6c600","ref":"refs/heads/master","pushedAt":"2024-06-12T22:44:16.000Z","pushType":"push","commitsCount":4,"pusher":{"login":"jheysel-r7","name":null,"path":"/jheysel-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/23320005?s=80&v=4"},"commit":{"message":"Land #19196, Cacti import package RCE\n\nThis exploit module leverages an arbitrary file write vulnerability\n(CVE-2024-25641) in Cacti versions prior to 1.2.27 to achieve RCE. It\nabuses the Import Packages feature to upload a specially crafted package\nthat embeds a PHP file.","shortMessageHtmlLink":"Land #19196, Cacti import package RCE"}},{"before":"c768b1e1d48d2d4f18804fa11402af50626f8580","after":"7031e0c7d7dcfb91e99555ed1ea5da7a16a8f687","ref":"refs/heads/master","pushedAt":"2024-06-12T21:17:04.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"msjenkins-r7","name":"Metasploit Jenkins Bot","path":"/msjenkins-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5332090?s=80&v=4"},"commit":{"message":"automatic module_metadata_base.json update","shortMessageHtmlLink":"automatic module_metadata_base.json update"}},{"before":"f3ad8a4737f31c288a01dc1f58a19b89574c5900","after":"c768b1e1d48d2d4f18804fa11402af50626f8580","ref":"refs/heads/master","pushedAt":"2024-06-12T21:00:34.000Z","pushType":"push","commitsCount":6,"pusher":{"login":"bwatters-r7","name":"Brendan","path":"/bwatters-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/17987018?s=80&v=4"},"commit":{"message":"Land #19243, Add exploit for CVE-2024-1800 (Telerik Report Deserialization RCE)\n\nMerge branch 'land-19243' into upstream-master","shortMessageHtmlLink":"Land #19243, Add exploit for CVE-2024-1800 (Telerik Report Deserializ…"}},{"before":"e68822613682561cbb8f82a2395ee64c82e28e0f","after":"f3ad8a4737f31c288a01dc1f58a19b89574c5900","ref":"refs/heads/master","pushedAt":"2024-06-12T16:33:23.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"zgoldman-r7","name":"Zach Goldman","path":"/zgoldman-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/106169455?s=80&v=4"},"commit":{"message":"Land #19225, Add android link to issues template","shortMessageHtmlLink":"Land #19225, Add android link to issues template"}},{"before":"f67526e24831655216d3fbc55e63f72ead5a763a","after":"e68822613682561cbb8f82a2395ee64c82e28e0f","ref":"refs/heads/master","pushedAt":"2024-06-12T16:07:26.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"msjenkins-r7","name":"Metasploit Jenkins Bot","path":"/msjenkins-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5332090?s=80&v=4"},"commit":{"message":"automatic module_metadata_base.json update","shortMessageHtmlLink":"automatic module_metadata_base.json update"}},{"before":"949ce3e89414590941b6b0ce1a5b0d8d11a4aac0","after":"f67526e24831655216d3fbc55e63f72ead5a763a","ref":"refs/heads/master","pushedAt":"2024-06-12T15:51:03.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"zgoldman-r7","name":"Zach Goldman","path":"/zgoldman-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/106169455?s=80&v=4"},"commit":{"message":"Land #19223, wp_ajax_load_more_file_upload.rb : Updated original author","shortMessageHtmlLink":"Land #19223, wp_ajax_load_more_file_upload.rb : Updated original author"}},{"before":"5b4e3f009d8880a7eefe52299289208293289d97","after":"949ce3e89414590941b6b0ce1a5b0d8d11a4aac0","ref":"refs/heads/master","pushedAt":"2024-06-11T22:03:59.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"msjenkins-r7","name":"Metasploit Jenkins Bot","path":"/msjenkins-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5332090?s=80&v=4"},"commit":{"message":"automatic module_metadata_base.json update","shortMessageHtmlLink":"automatic module_metadata_base.json update"}},{"before":"13fc954381594f6ca3879c9bd9866dad34810caa","after":"5b4e3f009d8880a7eefe52299289208293289d97","ref":"refs/heads/master","pushedAt":"2024-06-11T21:48:17.000Z","pushType":"push","commitsCount":4,"pusher":{"login":"bwatters-r7","name":"Brendan","path":"/bwatters-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/17987018?s=80&v=4"},"commit":{"message":"Land #19242, Add exploit for CVE-2024-4358 (Telerik Report Server Auth Bypass)\n\nMerge branch 'land-19242' into upstream-master","shortMessageHtmlLink":"Land #19242, Add exploit for CVE-2024-4358 (Telerik Report Server Aut…"}},{"before":"f2027784cf516895284c43f2b55de8a355ec5f53","after":"13fc954381594f6ca3879c9bd9866dad34810caa","ref":"refs/heads/master","pushedAt":"2024-06-11T17:39:03.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"msjenkins-r7","name":"Metasploit Jenkins Bot","path":"/msjenkins-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5332090?s=80&v=4"},"commit":{"message":"automatic module_metadata_base.json update","shortMessageHtmlLink":"automatic module_metadata_base.json update"}},{"before":"adeefd3ffeeec837eef82e501d43d01971f4d6b3","after":"f2027784cf516895284c43f2b55de8a355ec5f53","ref":"refs/heads/master","pushedAt":"2024-06-11T17:23:12.000Z","pushType":"push","commitsCount":4,"pusher":{"login":"bwatters-r7","name":"Brendan","path":"/bwatters-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/17987018?s=80&v=4"},"commit":{"message":"Land #19240, Rejetto HTTP File Server (HFS) 2.x - Unauthenticated RCE exploit module (CVE-2024-23692)\n\nMerge branch 'land-19240' into upstream-master","shortMessageHtmlLink":"Land #19240, Rejetto HTTP File Server (HFS) 2.x - Unauthenticated RCE…"}},{"before":"d07f64eb7f0b403095f24d0feb236b04f280deea","after":"adeefd3ffeeec837eef82e501d43d01971f4d6b3","ref":"refs/heads/master","pushedAt":"2024-06-11T15:54:13.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"msjenkins-r7","name":"Metasploit Jenkins Bot","path":"/msjenkins-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5332090?s=80&v=4"},"commit":{"message":"automatic module_metadata_base.json update","shortMessageHtmlLink":"automatic module_metadata_base.json update"}},{"before":"f5a2c6b3d51f076df3b41764e6e7c8049ad94c8d","after":"d07f64eb7f0b403095f24d0feb236b04f280deea","ref":"refs/heads/master","pushedAt":"2024-06-11T15:28:02.000Z","pushType":"pr_merge","commitsCount":5,"pusher":{"login":"adfoster-r7","name":null,"path":"/adfoster-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/60357436?s=80&v=4"},"commit":{"message":"Land #19239, update Zoomeye module","shortMessageHtmlLink":"Land #19239, update Zoomeye module"}},{"before":"247642a51604120b0bee4d7bcf76ad22c603ebaa","after":"f5a2c6b3d51f076df3b41764e6e7c8049ad94c8d","ref":"refs/heads/master","pushedAt":"2024-06-11T12:06:07.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"sjanusz-r7","name":"Simon Janusz","path":"/sjanusz-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/85949464?s=80&v=4"},"commit":{"message":"Land #19251, Reintroduce windows acceptance tests","shortMessageHtmlLink":"Land #19251, Reintroduce windows acceptance tests"}},{"before":"1077d4b0b0d108e2e30c59779df4bd282c06c5ba","after":"247642a51604120b0bee4d7bcf76ad22c603ebaa","ref":"refs/heads/master","pushedAt":"2024-06-11T11:20:18.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"msjenkins-r7","name":"Metasploit Jenkins Bot","path":"/msjenkins-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5332090?s=80&v=4"},"commit":{"message":"automatic module_metadata_base.json update","shortMessageHtmlLink":"automatic module_metadata_base.json update"}},{"before":"14f88ce8ea05721e8c5100393be5b97f07c973cd","after":"1077d4b0b0d108e2e30c59779df4bd282c06c5ba","ref":"refs/heads/master","pushedAt":"2024-06-11T10:57:45.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"cgranleese-r7","name":null,"path":"/cgranleese-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/69522014?s=80&v=4"},"commit":{"message":"Land #19191, Support Ruby 3.4.0-preview1","shortMessageHtmlLink":"Land #19191, Support Ruby 3.4.0-preview1"}},{"before":"9bbb82ab55f76c23a9567ce7bc1dd657cd886fe8","after":"14f88ce8ea05721e8c5100393be5b97f07c973cd","ref":"refs/heads/master","pushedAt":"2024-06-10T21:58:12.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"msjenkins-r7","name":"Metasploit Jenkins Bot","path":"/msjenkins-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/5332090?s=80&v=4"},"commit":{"message":"automatic module_metadata_base.json update","shortMessageHtmlLink":"automatic module_metadata_base.json update"}},{"before":"bdeaa97cda7e4716391ad9d1d994d9a002a0b724","after":"9bbb82ab55f76c23a9567ce7bc1dd657cd886fe8","ref":"refs/heads/master","pushedAt":"2024-06-10T21:37:15.000Z","pushType":"push","commitsCount":7,"pusher":{"login":"jheysel-r7","name":null,"path":"/jheysel-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/23320005?s=80&v=4"},"commit":{"message":"Land #18998, VSCode exploit for ipynb integration\n\nVSCode allows users open a Jypiter notebook (.ipynb) file. Versions\nv1.4.0 - v1.71.1 allow the Jypiter notebook to embed HTML and\njavascript, which can then open new terminal windows within VSCode. Each\nof these new windows can then execute arbitrary code at startup","shortMessageHtmlLink":"Land #18998, VSCode exploit for ipynb integration"}},{"before":"2a271048ca142fccdad3911cf14579bad3ebbbaa","after":"bdeaa97cda7e4716391ad9d1d994d9a002a0b724","ref":"refs/heads/master","pushedAt":"2024-06-10T09:25:57.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"cgranleese-r7","name":null,"path":"/cgranleese-r7","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/69522014?s=80&v=4"},"commit":{"message":"Land #19246, Dry BUNDLER_WITHOUT config","shortMessageHtmlLink":"Land #19246, Dry BUNDLER_WITHOUT config"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEZeYIigA","startCursor":null,"endCursor":null}},"title":"Activity · rapid7/metasploit-framework"}