Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 10 Jun 2018 08:00:36 +0000 (UTC)
From:      Antoine Brodin <antoine@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r472116 - head/security/metasploit
Message-ID:  <201806100800.w5A80a67051486@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: antoine
Date: Sun Jun 10 08:00:36 2018
New Revision: 472116
URL: https://svnweb.freebsd.org/changeset/ports/472116

Log:
  Update to 4.16.60

Modified:
  head/security/metasploit/Makefile
  head/security/metasploit/distinfo

Modified: head/security/metasploit/Makefile
==============================================================================
--- head/security/metasploit/Makefile	Sun Jun 10 08:00:11 2018	(r472115)
+++ head/security/metasploit/Makefile	Sun Jun 10 08:00:36 2018	(r472116)
@@ -2,7 +2,7 @@
 # $FreeBSD$
 
 PORTNAME=	metasploit
-PORTVERSION=	4.16.57
+PORTVERSION=	4.16.60
 CATEGORIES=	security
 
 MAINTAINER=	tanawts@gmail.com
@@ -26,7 +26,7 @@ RUN_DEPENDS=	nmap:security/nmap \
 		rubygem-metasploit-credential>=0:security/rubygem-metasploit-credential \
 		rubygem-metasploit_data_models>=0:security/rubygem-metasploit_data_models \
 		rubygem-metasploit-model>=0:security/rubygem-metasploit-model \
-		rubygem-metasploit-payloads>=1.3.34:security/rubygem-metasploit-payloads \
+		rubygem-metasploit-payloads>=1.3.37:security/rubygem-metasploit-payloads \
 		rubygem-metasploit_payloads-mettle>=0.3.8:security/rubygem-metasploit_payloads-mettle \
 		rubygem-msgpack1>=0:devel/rubygem-msgpack1 \
 		rubygem-network_interface>=0:net/rubygem-network_interface \
@@ -96,6 +96,7 @@ SHEBANG_FILES=	data/exploits/CVE-2017-17562/build.sh \
 		data/exploits/CVE-2017-7494/build.sh \
 		data/exploits/CVE-2017-7494/install-deps.sh \
 		docker/entrypoint.sh \
+		external/source/exploits/CVE-2016-4655/ssh_build.sh \
 		external/source/shellcode/windows/build.sh \
 		external/source/msfJavaToolkit/compile.sh \
 		external/source/msfJavaToolkit/testKeytool.rb \
@@ -106,6 +107,7 @@ SHEBANG_FILES=	data/exploits/CVE-2017-17562/build.sh \
 		modules/auxiliary/dos/http/slowloris.py \
 		modules/auxiliary/dos/tcp/claymore_dos.py \
 		modules/auxiliary/scanner/smb/impacket/dcomexec.py \
+		modules/auxiliary/scanner/smb/impacket/wmiexec.py \
 		modules/auxiliary/scanner/ssl/bleichenbacher_oracle.py \
 		modules/auxiliary/scanner/wproxy/att_open_proxy.py \
 		tools/dev/import-dev-keys.sh \

Modified: head/security/metasploit/distinfo
==============================================================================
--- head/security/metasploit/distinfo	Sun Jun 10 08:00:11 2018	(r472115)
+++ head/security/metasploit/distinfo	Sun Jun 10 08:00:36 2018	(r472116)
@@ -1,3 +1,3 @@
-TIMESTAMP = 1526718787
-SHA256 (rapid7-metasploit-framework-4.16.57_GH0.tar.gz) = e565e1adf9f1cf1f88757c6bea28d51fe1c9652fa985e82137796d2b370bc91d
-SIZE (rapid7-metasploit-framework-4.16.57_GH0.tar.gz) = 26078741
+TIMESTAMP = 1528615741
+SHA256 (rapid7-metasploit-framework-4.16.60_GH0.tar.gz) = f55ac839bfb14eb67711c448c73b79ea6efb75f9e3ddf92e4151318f6b6ed2e2
+SIZE (rapid7-metasploit-framework-4.16.60_GH0.tar.gz) = 26592827



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201806100800.w5A80a67051486>