Update supported browsers for multiple modules

Pretty Theft module does not work in IE

Multiple exploit modules haven't been tested
This commit is contained in:
bcoles
2012-09-29 17:39:14 +09:30
parent 256f63d28a
commit a135e9f51f
7 changed files with 1 additions and 12 deletions

View File

@@ -21,5 +21,3 @@ beef:
name: "Axous <= 1.1.1 Add User CSRF" name: "Axous <= 1.1.1 Add User CSRF"
description: "Attempts to add a user to an Axous <= 1.1.1 install (CVE-2012-2629)." description: "Attempts to add a user to an Axous <= 1.1.1 install (CVE-2012-2629)."
authors: ["bcoles", "Ivano Binetti"] authors: ["bcoles", "Ivano Binetti"]
target:
working: ["ALL"]

View File

@@ -21,5 +21,3 @@ beef:
name: "boastMachine <= 3.1 Add User CSRF" name: "boastMachine <= 3.1 Add User CSRF"
description: "Attempts to add a user to a boastMachine <= 3.1 install." description: "Attempts to add a user to a boastMachine <= 3.1 install."
authors: ["bcoles", "Dr.NaNo"] authors: ["bcoles", "Dr.NaNo"]
target:
working: ["ALL"]

View File

@@ -21,5 +21,3 @@ beef:
name: "Spring Framework Malicious Jar Exploit" name: "Spring Framework Malicious Jar Exploit"
description: "Execute a malicious JAR file using the Spring Framework 'class.classloader' vulnerability (CVE-2010-1622).<br/>Specify the URL for a form controller on the target and the URL for your malicious JAR file.<br/>For more information see: http://www.exploit-db.com/exploits/13918/<br/><br/>Versions Affected:<br/>3.0.0 to 3.0.2<br/>2.5.0 to 2.5.6.SEC01 (community releases)<br/>2.5.0 to 2.5.7 (subscription customers)" description: "Execute a malicious JAR file using the Spring Framework 'class.classloader' vulnerability (CVE-2010-1622).<br/>Specify the URL for a form controller on the target and the URL for your malicious JAR file.<br/>For more information see: http://www.exploit-db.com/exploits/13918/<br/><br/>Versions Affected:<br/>3.0.0 to 3.0.2<br/>2.5.0 to 2.5.6.SEC01 (community releases)<br/>2.5.0 to 2.5.7 (subscription customers)"
authors: ["bcoles"] authors: ["bcoles"]
target:
working: ["ALL"]

View File

@@ -21,5 +21,3 @@ beef:
name: "AlienVault OSSIM 3.1 XSS" name: "AlienVault OSSIM 3.1 XSS"
description: "Attempts to hook AlienVault OSSIM 3.1 using XSS.<br/>For more information see: http://www.exploit-db.com/exploits/20062/" description: "Attempts to hook AlienVault OSSIM 3.1 using XSS.<br/>For more information see: http://www.exploit-db.com/exploits/20062/"
authors: ["bcoles", "muts"] authors: ["bcoles", "muts"]
target:
working: ["ALL"]

View File

@@ -21,5 +21,3 @@ beef:
name: "Cisco Collaboration Server 5 XSS" name: "Cisco Collaboration Server 5 XSS"
description: "Attempts to hook Cisco Collaboration Server 5 using XSS.<br/>For more information see: http://www.exploit-db.com/exploits/11403/" description: "Attempts to hook Cisco Collaboration Server 5 using XSS.<br/>For more information see: http://www.exploit-db.com/exploits/11403/"
authors: ["bcoles", "s4squatch"] authors: ["bcoles", "s4squatch"]
target:
working: ["ALL"]

View File

@@ -21,5 +21,3 @@ beef:
name: "Serendipity <= 1.6 XSS" name: "Serendipity <= 1.6 XSS"
description: "Attempts to hook Serendipity <= 1.6 using XSS.<br/>For more information see: http://www.exploit-db.com/exploits/18884/" description: "Attempts to hook Serendipity <= 1.6 using XSS.<br/>For more information see: http://www.exploit-db.com/exploits/18884/"
authors: ["bcoles", "Stefan Schurtz"] authors: ["bcoles", "Stefan Schurtz"]
target:
working: ["ALL"]

View File

@@ -23,3 +23,4 @@ beef:
authors: ["pwndizzle", "vt [nick.freeman@security-assessment.com]", "xntrik"] authors: ["pwndizzle", "vt [nick.freeman@security-assessment.com]", "xntrik"]
target: target:
user_notify: ['ALL'] user_notify: ['ALL']
not_working: ['IE']