diff --git a/modules/exploits/axous_1_1_1_add_user_csrf/config.yaml b/modules/exploits/axous_1_1_1_add_user_csrf/config.yaml index 4231dc7e8..f1e802a65 100644 --- a/modules/exploits/axous_1_1_1_add_user_csrf/config.yaml +++ b/modules/exploits/axous_1_1_1_add_user_csrf/config.yaml @@ -21,5 +21,3 @@ beef: name: "Axous <= 1.1.1 Add User CSRF" description: "Attempts to add a user to an Axous <= 1.1.1 install (CVE-2012-2629)." authors: ["bcoles", "Ivano Binetti"] - target: - working: ["ALL"] diff --git a/modules/exploits/boastmachine_3_1_add_user_csrf/config.yaml b/modules/exploits/boastmachine_3_1_add_user_csrf/config.yaml index f754f84f7..6c703c02f 100644 --- a/modules/exploits/boastmachine_3_1_add_user_csrf/config.yaml +++ b/modules/exploits/boastmachine_3_1_add_user_csrf/config.yaml @@ -21,5 +21,3 @@ beef: name: "boastMachine <= 3.1 Add User CSRF" description: "Attempts to add a user to a boastMachine <= 3.1 install." authors: ["bcoles", "Dr.NaNo"] - target: - working: ["ALL"] diff --git a/modules/exploits/spring_framework_malicious_jar/config.yaml b/modules/exploits/spring_framework_malicious_jar/config.yaml index 1dbaace8f..7d5a17bc4 100644 --- a/modules/exploits/spring_framework_malicious_jar/config.yaml +++ b/modules/exploits/spring_framework_malicious_jar/config.yaml @@ -21,5 +21,3 @@ beef: name: "Spring Framework Malicious Jar Exploit" description: "Execute a malicious JAR file using the Spring Framework 'class.classloader' vulnerability (CVE-2010-1622).
Specify the URL for a form controller on the target and the URL for your malicious JAR file.
For more information see: http://www.exploit-db.com/exploits/13918/

Versions Affected:
3.0.0 to 3.0.2
2.5.0 to 2.5.6.SEC01 (community releases)
2.5.0 to 2.5.7 (subscription customers)" authors: ["bcoles"] - target: - working: ["ALL"] diff --git a/modules/exploits/xss/alienvault_ossim_3.1_xss/config.yaml b/modules/exploits/xss/alienvault_ossim_3.1_xss/config.yaml index a43a30312..653c95f3f 100644 --- a/modules/exploits/xss/alienvault_ossim_3.1_xss/config.yaml +++ b/modules/exploits/xss/alienvault_ossim_3.1_xss/config.yaml @@ -21,5 +21,3 @@ beef: name: "AlienVault OSSIM 3.1 XSS" description: "Attempts to hook AlienVault OSSIM 3.1 using XSS.
For more information see: http://www.exploit-db.com/exploits/20062/" authors: ["bcoles", "muts"] - target: - working: ["ALL"] diff --git a/modules/exploits/xss/cisco_collaboration_server_5_xss/config.yaml b/modules/exploits/xss/cisco_collaboration_server_5_xss/config.yaml index 3320a74f6..c5b1f6b7d 100644 --- a/modules/exploits/xss/cisco_collaboration_server_5_xss/config.yaml +++ b/modules/exploits/xss/cisco_collaboration_server_5_xss/config.yaml @@ -21,5 +21,3 @@ beef: name: "Cisco Collaboration Server 5 XSS" description: "Attempts to hook Cisco Collaboration Server 5 using XSS.
For more information see: http://www.exploit-db.com/exploits/11403/" authors: ["bcoles", "s4squatch"] - target: - working: ["ALL"] diff --git a/modules/exploits/xss/serendipity_1.6_xss/config.yaml b/modules/exploits/xss/serendipity_1.6_xss/config.yaml index 96d9e9bb2..4aea5824b 100644 --- a/modules/exploits/xss/serendipity_1.6_xss/config.yaml +++ b/modules/exploits/xss/serendipity_1.6_xss/config.yaml @@ -21,5 +21,3 @@ beef: name: "Serendipity <= 1.6 XSS" description: "Attempts to hook Serendipity <= 1.6 using XSS.
For more information see: http://www.exploit-db.com/exploits/18884/" authors: ["bcoles", "Stefan Schurtz"] - target: - working: ["ALL"] diff --git a/modules/social_engineering/pretty_theft/config.yaml b/modules/social_engineering/pretty_theft/config.yaml index e03c356bc..2540ced00 100644 --- a/modules/social_engineering/pretty_theft/config.yaml +++ b/modules/social_engineering/pretty_theft/config.yaml @@ -23,3 +23,4 @@ beef: authors: ["pwndizzle", "vt [nick.freeman@security-assessment.com]", "xntrik"] target: user_notify: ['ALL'] + not_working: ['IE']