From 1ff2272566298e25c2a046853efce87fb0bfe776 Mon Sep 17 00:00:00 2001 From: Haoxi Tan Date: Thu, 9 Jan 2020 10:57:10 +1000 Subject: [PATCH] updated working browsers --- modules/exploits/local_host/window_mail_client_dos/config.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/modules/exploits/local_host/window_mail_client_dos/config.yaml b/modules/exploits/local_host/window_mail_client_dos/config.yaml index 9b3c15b7e..65c57e309 100644 --- a/modules/exploits/local_host/window_mail_client_dos/config.yaml +++ b/modules/exploits/local_host/window_mail_client_dos/config.yaml @@ -12,5 +12,5 @@ beef: description: "This module exploits an unhandled exception in Windows Mail to crash the client remotely.

Windows Mail is launched and then crashed if it is not already open. It comes installed by default on Windows Vista (but it's also vulnerable on Windows 7 SP2).

The protocol handler used will be: nntp." authors: ["bcoles"] target: - user_notify: ["FF", "S"] + user_notify: ["FF"] not_working: ["All"]